From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Hardware security strategies exploiting nanoelectronic circuits., , , , , и . ASP-DAC, стр. 368-372. IEEE, (2013)Spike-Time-Dependent Encoding for Neuromorphic Processors., , , , , и . JETC, 12 (3): 23:1-23:21 (2015)Reservoir Computing in Embedded Systems: Three variants of the reservoir algorithm., , , , и . IEEE Consumer Electronics Magazine, 6 (3): 67-73 (2017)Analysis of dynamic linear and non-linear memristor device models for emerging neuromorphic computing hardware design., , , и . IJCNN, стр. 1-5. IEEE, (2010)Foundations of memristor based PUF architectures., , , , и . NANOARCH, стр. 52-57. IEEE Computer Society, (2013)Memristor-based synapse design and a case study in reconfigurable systems., , , , и . IJCNN, стр. 1-6. IEEE, (2013)A survey on memristor modeling and security applications., , , , и . ISQED, стр. 440-447. IEEE, (2015)A write-time based memristive PUF for hardware security applications., , , и . ICCAD, стр. 830-833. IEEE, (2013)Reservoir Computing with Planar Nanomagnet Arrays., , , , , и . CoRR, (2020)Compact method for modeling and simulation of memristor devices: Ion conductor chalcogenide-based memristor devices., , , , , , , и . NANOARCH, стр. 1-4. IEEE Computer Society, (2010)