Author of the publication

A 40 GHz modified-Colpitts voltage controlled oscillator with increased tuning range.

, , , and . ISCAS (1), page 717-720. IEEE, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A 40 GHz modified-Colpitts voltage controlled oscillator with increased tuning range., , , and . ISCAS (1), page 717-720. IEEE, (2003)Automatic Multi-source Data Fusion Technique of Powerline Corridor using UAV Lidar., , , , , and . ISC2, page 1-5. IEEE, (2022)Solving Discriminant Models Using Interior Point Algorithm., , and . CASDMKM, volume 3327 of Lecture Notes in Computer Science, page 51-60. Springer, (2004)An input information enhanced model for relation extraction., , , , and . Neural Comput. Appl., 31 (12): 9113-9126 (2019)A Method of Polarity Computation of Chinese Sentiment Words Based on Gaussian Distribution., , , , and . CICLing (2), volume 8404 of Lecture Notes in Computer Science, page 53-61. Springer, (2014)Improving the Accuracy of Integer Signedness Error Detection Using Data Flow Analysis., , , and . SEKE, page 601-606. KSI Research Inc. and Knowledge Systems Institute Graduate School, (2015)BIT at SemEval-2017 Task 1: Using Semantic Information Space to Evaluate Semantic Textual Similarity., , , , and . SemEval@ACL, page 77-84. Association for Computational Linguistics, (2017)Chinese Text Analysis Based on Minimal Recursion Semantics., , , and . CLSW, volume 9332 of Lecture Notes in Computer Science, page 421-429. Springer, (2015)A Dual-role Trust Model for Social Commerce: A Guanxi Perspective., , , and . Inf. Manag., 58 (7): 103512 (2021)Catch You With Cache: Out-of-VM Introspection to Trace Malicious Executions., , and . DSN, page 326-337. IEEE, (2021)