Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Demonstration of High Endurance Capability on Mega-Bit RRAM Macro and Model of ppm Level Failures., , , , , , , , , and 1 other author(s). VLSI Technology and Circuits, page 318-319. IEEE, (2022)An Efficient NDN-Based Load Adjustment Scheme for Reduction of Energy Consumption., , and . CIT, page 533-538. IEEE Computer Society, (2014)Data Lifetime Enhancement for Improving QoS in NDN., , , and . ANT/SEIT, volume 32 of Procedia Computer Science, page 69-76. Elsevier, (2014)Annealing Self-Distillation Rectification Improves Adversarial Training., , and . ICLR, OpenReview.net, (2024)Enhancing Targeted Attack Transferability via Diversified Weight Pruning., , and . CoRR, (2022)Controlling Adverse Selection in Information Security Budgeting: An IT Governance Approach.. AMCIS, page 540. Association for Information Systems, (2006)An adaptive randomized search protocol in peer-to-peer systems., , , , and . SAC, page 533-537. ACM, (2007)Temporal Database Bibliography Update., , and . Temporal Databases, Dagstuhl, volume 1399 of Lecture Notes in Computer Science, page 338-366. Springer, (1997)A Message-Efficient Peer-to-Peer Search Protocol Based on Adaptive Index Dissemination., , , , and . IEICE Trans. Inf. Syst., 92-D (2): 258-268 (2009)A Middleware for Open CNC Architecture., , and . CASE, page 558-561. IEEE, (2006)