Author of the publication

Preserving Hamming Distance in Arithmetic and Logical Operations.

, , , and . J. Electron. Test., 29 (6): 903-907 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Compressive scanning of an object signature., , , and . Nat. Comput., 14 (3): 457-467 (2015)Soft Computing Based Epidemical Crisis Prediction., , , and . Intelligent Methods for Cyber Warfare, volume 563 of Studies in Computational Intelligence, Springer, (2015)Complex Fuzzy Sets and Complex Fuzzy Logic an Overview of Theory and Applications., , and . Fifty Years of Fuzzy Logic and its Applications, volume 326 of Studies in Fuzziness and Soft Computing, Springer, (2015)Caching in the TSP Search Space., and . IEA/AIE, volume 5579 of Lecture Notes in Computer Science, page 221-230. Springer, (2009)Using Designers Effort for User Interface Evaluation., , , and . SMC, page 480-485. IEEE, (2009)Neural network methods for fast and portable prediction of CPU power consumption., , , and . IGSC, page 1-4. IEEE Computer Society, (2015)Delta-Huffman Coding of Unbounded Integers.. DCC, page 428. IEEE, (2018)Image Registration Using Dynamic Space Warping., and . Artificial Intelligence and Pattern Recognition, page 128-135. ISRST, (2008)Identifying usability issues via algorithmic detection of excessive visual search., , and . CHI, page 2943-2952. ACM, (2012)Aiding usability evaluation via detection of excessive visual search., , , and . CHI Extended Abstracts, page 1825-1830. ACM, (2011)