Author of the publication

Modeling and Demonstration for Multi-level Weight Conductance in Computational FeFET Memory Cell.

, , , , , , , , , , and . IMW, page 1-4. IEEE, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Converting the Point of View of Message Spoken to Virtual Assistants., , , , , and . EMNLP (Findings), volume EMNLP 2020 of Findings of ACL, page 154-163. Association for Computational Linguistics, (2020)Effective Web-Related Resource Security Using Distributed Role Hierarchy., , , and . WAIM, volume 3129 of Lecture Notes in Computer Science, page 87-96. Springer, (2004)Lightweight IEC 61850 Secure Communication Module for Microgrids., , and . BWCCA, volume 2 of Lecture Notes on Data Engineering and Communications Technologies, page 443-451. Springer, (2016)RPS: An Extension of Reference Monitor to Prevent Race-Attacks., , , and . PCM (1), volume 3331 of Lecture Notes in Computer Science, page 556-563. Springer, (2004)Training Neural Networks with Low Precision Dynamic Fixed-Point., , , and . ICCD, page 405-408. IEEE Computer Society, (2018)An Effective Method for Location Privacy in Ubiquitous Computing., , and . EUC Workshops, volume 3823 of Lecture Notes in Computer Science, page 1006-1015. Springer, (2005)An Alert Reasoning Method for Intrusion Detection System Using Attribute Oriented Induction., , , , , and . ICOIN, volume 3391 of Lecture Notes in Computer Science, page 72-79. Springer, (2005)Hidden chain: a full-duplex MAC protocol using hidden terminal relationships in wlans., , and . WONS, page 96-99. IEEE, (2016)Modeling and Demonstration for Multi-level Weight Conductance in Computational FeFET Memory Cell., , , , , , , , , and 1 other author(s). IMW, page 1-4. IEEE, (2024)Deep color transfer using histogram analogy., , , , , and . Vis. Comput., 36 (10): 2129-2143 (2020)