Author of the publication

Real-time numerical system convertor via two-dimensional WS2-based memristive device.

, , , , , , , , , , and . Frontiers Comput. Neurosci., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new look-up-table based adaptive baseband predistorter., , , and . BMEI, page 1402-1405. IEEE, (2012)An Effective Dual-Fisheye Lens Stitching Method Based on Feature Points., , , and . MMM (1), volume 11295 of Lecture Notes in Computer Science, page 665-677. Springer, (2019)Detection of unknown moving objects by reciprocation of observed information between mobile robot., , and . IROS, page 996-1003. IEEE, (1994)Real-time numerical system convertor via two-dimensional WS2-based memristive device., , , , , , , , , and 1 other author(s). Frontiers Comput. Neurosci., (2022)A Graph Attention Network Model for GMV Forecast on Online Shopping Festival., , , , , , , , , and . APWeb/WAIM (1), volume 12858 of Lecture Notes in Computer Science, page 134-139. Springer, (2021)Using context information and local feature points in face clustering for consumer photos., , and . ICASSP, page 1141-1144. IEEE, (2009)Physical layer effects on the MAC goodput performance for the rate adaptive IEEE 802.11a/g WLAN., , and . WCNC, page 1873-1878. IEEE, (2004)MAS organization: design, enforcement and instantiation., , , and . PDCAT, page 529-532. IEEE Computer Society, (2005)Interpretable MTL from Heterogeneous Domains using Boosted Tree., and . CoRR, (2020)New Image Steganography via Secret-Fragment-Visible Mosaic Images by Nearly-Reversible Color Transformation., and . ISVC (2), volume 6939 of Lecture Notes in Computer Science, page 64-74. Springer, (2011)