Author of the publication

Protecting Memories against Soft Errors: The Case for Customizable Error Correction Codes.

, , , and . IEEE Trans. Emerg. Top. Comput., 9 (2): 651-663 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Systematic Point Cloud Edge Detection Framework for Automatic Aircraft Skin Milling., , , , , , and . IEEE Trans. Ind. Informatics, 20 (1): 560-572 (January 2024)GSCEU-Net: An End-to-End Lightweight Skin Lesion Segmentation Model with Feature Fusion Based on U-Net Enhancements., , , , , , and . Inf., 14 (9): 486 (2023)MNCM: Multi-level Network Cascades Model for Multi-Task Learning.. CIKM, page 4565-4569. ACM, (2022)Dynamic programming based optimal trading strategy model of volatile assets., , , , and . ICBDC, page 68-73. ACM, (2023)MT-BICN: Multi-task Balanced Information Cascade Network for Recommendation., and . KSEM (3), volume 14119 of Lecture Notes in Computer Science, page 423-435. Springer, (2023)Reversible Data Hiding in Medical Image for Contrast Enhancement of ROI., and . CIS, page 633-637. IEEE Computer Society, (2016)A real-time system low power scheduling algorithm based on total bandwidth server., , , and . ICIA, page 1566-1570. IEEE, (2018)A quality-enhancing coverage scheme for camera sensor networks., , , , and . IECON, page 8458-8463. IEEE, (2017)Middlebox resources management using OpenFlow., , , and . INFOCOM Workshops, page 976-977. IEEE, (2016)VQL: Providing Query Efficiency and Data Authenticity in Blockchain Systems., , , and . ICDE Workshops, page 1-6. IEEE, (2019)