Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hardware Accelerated Mining of Domain Knowledge., , and . Network Science and Cybersecurity, volume 55 of Advances in Information Security, Springer, (2014)Neuromorphic algorithms on clusters of PlayStation 3s., , , , , and . IJCNN, page 1-10. IEEE, (2010)Cognitive domain ontologies on the TrueNorth neurosynaptic system., , , and . IJCNN, page 3543-3550. IEEE, (2017)Methods for high resolution programming in lithuim niobate memristors for neuromorphic hardware., , , , , and . IJCNN, page 1704-1708. IEEE, (2017)State Preserving Extreme Learning Machine: A Monotonically Increasing Learning Approach., , , and . Neural Processing Letters, 45 (2): 703-725 (2017)Effective Quantization Approaches for Recurrent Neural Networks., , , , and . IJCNN, page 1-8. IEEE, (2018)Analysis and Design of Memristor Crossbar Based Neuromorphic Intrusion Detection Hardware., and . IJCNN, page 1-7. IEEE, (2018)Deep Versus Wide Convolutional Neural Networks for Object Recognition on Neuromorphic System., , , , , and . IJCNN, page 1-8. IEEE, (2018)A Reconfigurable Low Power High Throughput Streaming Architecture for Big Data Processing., , and . CoRR, (2016)Memristor crossbar based winner take all circuit design for self-organization., and . NCS, page 10:1-10:4. ACM, (2017)