From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Sneak-Path Based Test and Diagnosis for 1R RRAM Crossbar Using Voltage Bias Technique., , , , и . DAC, стр. 38:1-38:6. ACM, (2017)Efficient Conditional Privacy-Preserving Authentication Scheme Using Revocation Messages for VANET., , , , и . ICCCN, стр. 1-8. IEEE, (2018)Design and development of a 7-DOF humanoid arm., , , и . ROBIO, стр. 277-282. IEEE, (2012)A power series based inverse-kinematics solution of a humanoid robot hand with coupled joints., , , и . ROBIO, стр. 1455-1460. IEEE, (2016)The Probability of Dual Hesitant Fuzzy Event and Its Applications to Bayesian Network Inferences., , , и . ICNC-FSKD, том 1074 из Advances in Intelligent Systems and Computing, стр. 736-755. Springer, (2019)Methodological Framework for the Transition from Requirements to Software Architectures., , и . ISD, стр. 139-151. Springer, (2012)Exemplar-based image inpainting using structure consistent patch matching., , , и . Neurocomputing, (2017)A Novel Test Method for Metallic CNTs in CNFET-Based SRAMs., , , , , , и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 35 (7): 1192-1205 (2016)A Security Evaluation Method Based on Threat Classification for Web Service., , , и . J. Softw., 6 (4): 595-603 (2011)Commutative encryption and watermarking based on orthogonal decomposition., , и . Multim. Tools Appl., 70 (3): 1617-1635 (2014)