Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Graph Theory Approach towards IJTAG Security via Controlled Scan Chain Isolation., and . VTS, page 1-6. IEEE, (2019)Biosequence Analysis Using Intel® Xeon Phi., , , , , , and . EMS, page 497-499. IEEE, (2013)Rotation Invariant Graph Neural Networks using Spin Convolutions., , , , , , and . CoRR, (2021)Biomedical signal to image conversion and classification using flexible deep learning techniques., , , and . Int. J. Bus. Intell. Data Min., 24 (2): 183-202 (2024)Microarchitectures for Managing Chip Revenues under Process Variations., , , , and . IEEE Comput. Archit. Lett., 7 (1): 5-8 (2008)Microarchitectures for Managing Chip Revenues under Process Variations., , , , and . IEEE Comput. Archit. Lett., 6 (2): 29-32 (2007)GemNet-OC: Developing Graph Neural Networks for Large and Diverse Molecular Simulation Datasets., , , , , , and . Trans. Mach. Learn. Res., (2022)Handwritten Odia numeral recognition using combined CNN-RNN., and . Int. J. Grid Util. Comput., 14 (4): 382-388 (2023)Stream Scheduling: A Framework to Manage Bulk Operations in Memory Hierarchies., and . Euro-Par, volume 5168 of Lecture Notes in Computer Science, page 337-349. Springer, (2008)The Open Catalyst 2020 (OC20) Dataset and Community Challenges., , , , , , , , , and 7 other author(s). CoRR, (2020)