Author of the publication

Real-Time Communication over Wormhole-Switched On-Chip Networks.

. Mälardalen University College, Västerås, Eskilstuna, Sweden, (2017)base-search.net (ftmaelardalensho:oai:DiVA.org:mdh-35316).

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

M-lump solutions to the (2+1)-dimensional generalized Calogero-Bogoyavlenshii-Schiff equation.. Math. Comput. Simul., (April 2023)The Principle and Design of Separate Fingerprint Identification System.. MLICOM, volume 294 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 32-41. Springer, (2019)Stability of elliptic solutions to the defocusing fourth order nonlinear Schrödinger equation., and . Commun. Nonlinear Sci. Numer. Simul., (2023)Smoothing rate control for multiple video streams using game theory., , and . ISCAS, page 2913-2917. IEEE, (2011)Optimizing the Cooling System of High-Speed Train Environmental Wind Tunnels Using the Gene-Directed Change Genetic Algorithm., , , and . Entropy, 25 (10): 1386 (October 2023)Real-Time Communication over Wormhole-Switched On-Chip Networks.. Mälardalen University College, Västerås, Eskilstuna, Sweden, (2017)base-search.net (ftmaelardalensho:oai:DiVA.org:mdh-35316).TBACkp: HER2 expression status classification network focusing on intrinsic subenvironmental characteristics of breast cancer liver metastases., , , , , , and . Comput. Biol. Medicine, (March 2024)MRISNet:Deep-learning-based Martian instance segmentation against blur., , and . Earth Sci. Informatics, 16 (1): 965-981 (March 2023)Curriculum Contrastive Learning for Fake News Detection., , , and . CIKM, page 4309-4313. ACM, (2022)Efficient solution to the millionaires' problem based on asymmetric commutative encryption scheme., , , , and . Comput. Intell., 35 (3): 555-576 (2019)