Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MDS array codes with optimal rebuilding., , and . ISIT, page 1240-1244. IEEE, (2011)Patterned cells for phase change memories., , , and . ISIT, page 2333-2337. IEEE, (2011)A Channel Estimation Scheme for MIMO-MC-CDMA Downlink in High Mobility Environments., and . IEICE Trans. Commun., 88-B (3): 1282-1286 (2005)An implementation of analytical power model on integrated GPU., , , , , and . ISIC, page 1-4. IEEE, (2016)CHAM: Improving Prefetch Efficiency Using a Composite Hierarchy-Aware Method., , , and . J. Circuits Syst. Comput., 27 (7): 1850114:1-1850114:34 (2018)Dynamic Power Estimation with Hardware Performance Counters Support on Multi-core Platform., , , and . ACA, volume 451 of Communications in Computer and Information Science, page 177-189. Springer, (2014)An accurate and highly-efficient performance evaluation approach based on queuing model for on-chip network., , , and . Sci. China Inf. Sci., 56 (7): 1-20 (2013)Mac or Non-MAC: not a Problem., , , , and . J. Circuits Syst. Comput., (2014)Protecting Mass Data Basing on Small Trusted Agent., , , and . ISPEC, volume 3439 of Lecture Notes in Computer Science, page 362-373. Springer, (2005)A 6.35Mbps 1024-bit RSA crypto coprocessor in a 0.18um CMOS technology., , , and . VLSI-SoC, page 216-221. IEEE, (2006)