Author of the publication

On Compacting Test Response Data Containing Unknown Values.

, , , , and . ICCAD, page 855-862. IEEE Computer Society / ACM, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed Fixed-Time Event-Triggered Consensus Control for Uncertain Nonlinear Multiagent Systems with Actuator Failures., , , and . Int. J. Intell. Syst., (2023)Edge-Assisted Hierarchical Batch Authentication Scheme for VANETs., , , , , and . IEEE Trans. Veh. Technol., 73 (1): 1253-1262 (January 2024)Few-Shot Remote Sensing Image Scene Classification Based on Metric Learning and Local Descriptors., , , , and . Remote. Sens., 15 (3): 831 (February 2023)Kinematic Redundancy Analysis during Goal-Directed Motion for Trajectory Planning of an Upper-Limb Exoskeleton Robot., , , , , , and . EMBC, page 5251-5255. IEEE, (2019)A Greedy Assist-as-Needed Controller for Upper Limb Rehabilitation., , , and . IEEE Trans. Neural Networks Learn. Syst., 30 (11): 3433-3443 (2019)Locality Sensitive Hashing based deepmatching for optical flow estimation., , , and . ICASSP, page 1472-1476. IEEE, (2017)Blind separation of convolutive mixtures based on second order and third order statistics., , , , and . ICASSP (5), page 305-308. IEEE, (2003)Graph Optimization Approach to Localization with IMU and Ultra-Wideband Measurements., , , and . CoRR, (2018)A Practical Image Encryption Algorithm for Privacy Protection., , , and . ICCT, page 1611-1615. IEEE, (2019)Critical segment based real-time E-signature for securing mobile transactions., , , , and . CNS, page 7-15. IEEE, (2015)