Author of the publication

Performance/Resources Comparison of Hardware Implementations on Fully Connected Network Inference.

, , , , , , and . IDEAL, volume 13756 of Lecture Notes in Computer Science, page 348-358. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Snow Coherence Conservation for SWE Retrieval at L-, S-, C-and X-Bands., , , , , , and . IGARSS, page 860-863. IEEE, (2021)Videolaryngoscopy Simulator: New Technology Leads to New Training Challenges., , , , , , and . MMVR, volume 220 of Studies in Health Technology and Informatics, page 84-90. IOS Press, (2016)FAS-CT: FPGA-Based Acceleration System with Continuous Training., , , , , , and . FedCSIS (Communication Papers), volume 37 of Annals of Computer Science and Information Systems, page 131-139. (2023)VR story production on Disney animation's "cycles"., , , , , , , and . SIGGRAPH Talks, page 65:1-65:2. ACM, (2018)Performance/Resources Comparison of Hardware Implementations on Fully Connected Network Inference., , , , , , and . IDEAL, volume 13756 of Lecture Notes in Computer Science, page 348-358. Springer, (2022)Multilayer network analysis of C. elegans: Looking into the locomotory circuitry., , , and . Neurocomputing, (2021)Capacity in downlink WCDMA hexagonal and sectorized scenarios using soft handover techniques with SIR-based power control and SSDT., , and . PIMRC, page 6-10. IEEE, (2004)Power allocation strategies in downlink WCDMA systems using soft handover and SSDT power control techniques., , and . VTC Fall (2), page 817-821. IEEE, (2004)Effects on Performance of Individual versus Dyadic Practice during an Avatar-Based Three-Dimensional Virtual Home Safety Simulation., , , , and . MMVR, volume 184 of Studies in Health Technology and Informatics, page 13-19. IOS Press, (2013)Best practices for the security evaluation of biometric systems., , , and . ICCST, page 1-6. IEEE, (2014)