Author of the publication

Software pipelining for graphic processing unit acceleration: Partition, scheduling and granularity.

, , , and . Int. J. High Perform. Comput. Appl., 30 (2): 169-185 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A fault tolerant control for modular multilevel converter under submodule fault conditions., , , , and . IECON, page 3155-3160. IEEE, (2017)Semantic Probabilistic Traversable Map Generation For Robot Path Planning., , , , , and . ROBIO, page 2576-2582. IEEE, (2019)Modulated Model Predictive Control for MMC-Based Active Front-End Rectifiers Under Unbalanced Grid Conditions., , , and . IEEE Trans. Ind. Electron., 66 (3): 2398-2409 (2019)What the Past Tells About the Future: Historical Prices in the Durable Goods Market., , and . Manag. Sci., 68 (12): 8857-8871 (December 2022)Dual Hidden Failure Model for Cyber Physical Power System., , , , , and . IEEE Access, (2020)EdgeCRNN: an edge-computing oriented model of acoustic feature enhancement for keyword spotting., , , , and . J. Ambient Intell. Humaniz. Comput., 13 (3): 1525-1535 (2022)Predicting Thermodynamic Properties of Alkanes by High-Throughput Force Field Simulation and Machine Learning., , , and . J. Chem. Inf. Model., 58 (12): 2502-2516 (2018)A synthetic indifferentiability analysis of some block-cipher-based hash functions., , and . Des. Codes Cryptogr., 48 (3): 293-305 (2008)WBMatrix: An Optimized Matrix Library for White-Box Block Cipher Implementations., , , , and . IEEE Trans. Computers, 71 (12): 3375-3388 (2022)Optimal model search for hardware-trojan-based bit-level fault attacks on block ciphers., , , and . Sci. China Inf. Sci., 61 (3): 039106:1-039106:3 (2018)