Author of the publication

A FPGA-based Hardware Accelerator for Bayesian Confidence Propagation Neural Network.

, , , , , , , , and . NorCAS, page 1-6. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Study of the Structure "Verb+Numeral+Measure(le)" from the Perspective of Information Conveying Grammar., and . CLSW, volume 7717 of Lecture Notes in Computer Science, page 569-577. Springer, (2012)Reactive Mobile Manipulation using Dynamic Trajectory Tracking., , and . ICRA, page 3473-3478. IEEE, (2000)基于轨迹多特性的隐私保护算法 (Privacy Protection Algorithm Based on Multi-characteristics of Trajectory)., , and . 计算机科学, 46 (1): 190-195 (2019)An undeniable strong DSVS scheme with no bilinear pairings., , , , and . CISP-BMEI, page 1944-1948. IEEE, (2016)Design of Smart Unstaffed Retail Shop Based on IoT and Artificial Intelligence., , , , , , and . IEEE Access, (2020)Continuous-time inverse quadratic optimal control problem., , and . Autom., (2020)Design and Analysis of an Anonymous and Fair Trading Scheme for Electronic Resources with Blind Adaptor Signature., and . CISP-BMEI, page 1-5. IEEE, (2023)Analytical solutions to feedback systems on the special orthogonal group SO(n)., , , and . CDC, page 5246-5251. IEEE, (2013)On the number of leaders needed to ensure network connectivity., , , and . CDC, page 1797-1802. IEEE, (2008)Cryptography Teaching Based on Problem Oriented: Take the Knowledge Point of Designated Verifier Signature as an Example., , , , and . ICEBT, page 73-77. ACM, (2018)