Author of the publication

Neuro-Symbolic Computing: Advancements and Challenges in Hardware-Software Co-Design.

, , , , , , , , and . IEEE Trans. Circuits Syst. II Express Briefs, 71 (3): 1683-1689 (March 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attacks on Distributed Sequential Control in Manufacturing Automation., , and . IEEE Trans. Ind. Informatics, 17 (2): 775-786 (2021)The Wireless Control Network: A New Approach for Control Over Networks., , , and . IEEE Trans. Autom. Control., 56 (10): 2305-2318 (2011)Fuzzy inference mechanism for recognition of contact states in intelligent robotic assembly., , , and . J. Intell. Manuf., 25 (3): 571-587 (2014)Topological Conditions for In-Network Stabilization of Dynamical Systems., , , and . IEEE J. Sel. Areas Commun., 31 (4): 794-807 (2013)Datasets, Models, and Algorithms for Multi-Sensor, Multi-agent Autonomy Using AVstack., and . CoRR, (2023)RadCloud: Real-Time High-Resolution Point Cloud Generation Using Low-Cost Radars for Aerial and Ground Vehicles., , , , , , and . CoRR, (2024)Robust architectures for embedded wireless network control and actuation., , and . ACM Trans. Embed. Comput. Syst., 11 (4): 82:1-82:24 (2012)Security Analysis of Camera-LiDAR Semantic-Level Fusion Against Black-Box Attacks on Autonomous Vehicles., , and . CoRR, (2021)ε-Neural Thompson Sampling of Deep Brain Stimulation for Parkinson Disease Treatment., , and . CoRR, (2024)Integrating Security in Resource-Constrained Cyber-Physical Systems., , and . ACM Trans. Cyber Phys. Syst., 4 (3): 28:1-28:27 (2020)