Author of the publication

34.1 A 28nm 83.23TFLOPS/W POSIT-Based Compute-in-Memory Macro for High-Accuracy AI Applications.

, , , , , , , , , and . ISSCC, page 566-568. IEEE, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Circular-shift linear network coding., , , , and . ISIT, page 2383-2387. IEEE, (2017)An efficient authentication protocol for low-cost RFID system in the prensence of malicious readers., and . FSKD, page 2111-2114. IEEE, (2012)Local segment-shared protection based on source egress gateway selection for multi-domain optical mesh networks., , , , and . Sci. China Inf. Sci., 54 (2): 227-235 (2011)New Classes of Ternary Bent Functions From the Coulter-Matthews Bent Functions., , and . IEEE Trans. Inf. Theory, 64 (6): 4653-4663 (2018)Kinematic modeling of a spatial three degrees-of-freedom compliant micro-motion parallel mechanism considering input coupling effect and bilateral restrained torsion., , , , , and . Ind. Robot, 50 (3): 385-400 (2023)FourPhonon: An extension module to ShengBTE for computing four-phonon scattering rates and thermal conductivity., , , , and . Comput. Phys. Commun., (2022)FRNet: An MCS Framework for Efficient and Secure Data Sensing and Privacy Protection in IoVs., , , , , , and . IEEE Internet Things J., 10 (18): 16343-16357 (September 2023)Visual Attention Dehazing Network with Multi-level Features Refinement and Fusion., , , and . Pattern Recognit., (2021)Time-stamp based mutual authentication protocol for mobile RFID system., , and . WOCC, page 702-706. IEEE, (2013)HTTP-sCAN: Detecting HTTP-flooding attaCk by modeling multi-features of web browsing behavior from noisy dataset., , , , and . APCC, page 677-682. IEEE, (2013)