Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of Numerical Simulation Technique to the Study of Well Killing While Drilling Mud Has Completely Erupted Out from Borehole., , , and . ICFIE, volume 62 of Advances in Intelligent and Soft Computing, page 953-966. (2009)Energy Efficient On-Demand Dynamic Branch Prediction Models., , , , , and . IEEE Trans. Computers, 69 (3): 453-465 (2020)Trained Ternary Quantization., , , and . ICLR (Poster), OpenReview.net, (2017)Once-for-All: Train One Network and Specialize it for Efficient Deployment., , , , and . ICLR, OpenReview.net, (2020)Robust Face Recognition using Local Illumination Normalization and Discriminant Feature Point Selection, , , , and . CoRR, (2012)Towards Edge-Cloud Collaborative Machine Learning: A Quality-aware Task Partition Framework., , , , and . CIKM, page 3705-3714. ACM, (2022)EfficientViT: Lightweight Multi-Scale Attention for High-Resolution Dense Prediction., , , , and . ICCV, page 17256-17267. IEEE, (2023)Efficient and Robust LiDAR-Based End-to-End Navigation., , , , , and . ICRA, page 13247-13254. IEEE, (2021)Detecting Rules-related Attacks in RPL-based Resource-Constrained Wireless Networks., , and . ISSPIT, page 1-8. IEEE, (2020)BitDelta: Your Fine-Tune May Only Be Worth One Bit, , , , , , and . (2024)