From post

BOHA: A High Performance VSLAM Backend Optimization Hardware Accelerator Using Recursive Fine-Grain H-Matrix Decomposition and Early-Computing With Approximate Linear Solver.

, , , , , , , , , , и . IEEE Trans. Circuits Syst. II Express Briefs, 70 (10): 3827-3831 (октября 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

TL;DR Hazard: A Comprehensive Study of Levelsquatting Scams., , , , , , , , , и 3 other автор(ы). SecureComm (2), том 305 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 3-25. Springer, (2019)Efficient and Density-Aware Routing for Wireless Sensor Networks., , , и . ICCCN, стр. 207-212. IEEE, (2006)Higher Order Support Vector Random Fields for Hyperspectral Image Classification., , , и . ISPRS Int. J. Geo Inf., 7 (1): 19 (2018)Using Trust for Restricted Delegation in Grid Environments., , , и . ISPEC, том 3439 из Lecture Notes in Computer Science, стр. 293-301. Springer, (2005)Sliding Mode Control for a Surgical Teleoperation System via a Disturbance Observer., , и . IEEE Access, (2019)Joint Relay Selection and Resource Allocation for Delay-Sensitive Traffic in Multi-Hop Relay Networks., , , и . KSII Trans. Internet Inf. Syst., 16 (9): 3008-3028 (2022)Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks., , , , , , , , , и 1 other автор(ы). CoRR, (2020)TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis., , , , , , , , , и 3 other автор(ы). EuroS&P, стр. 560-575. IEEE, (2019)Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks., , , , , , , , , и . CCS, стр. 1939-1952. ACM, (2020)CDN Judo: Breaking the CDN DoS Protection with Itself., , , , , , , , и . NDSS, The Internet Society, (2020)