Author of the publication

Non-Memoryless vs. Memoryless Hardware Architectures for Convolutional Neural Networks.

, , , and . LASCAS, page 1-4. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Effect of Intelligent Escape on Distributed SER-Based Search., , , , and . ICCSA (1), volume 7333 of Lecture Notes in Computer Science, page 101-112. Springer, (2012)Co-design system for template matching using dedicated co-processor and modified elephant herding optimization., , , and . LASCAS, page 1-4. IEEE, (2018)Static Packet Routing in NoC Platform Using ACO-Based Algorithms., , and . IDEAL, volume 7435 of Lecture Notes in Computer Science, page 84-91. Springer, (2012)Power-Aware Multi-objective Evolutionary Optimization for Application Mapping on NoC Platforms., , and . IEA/AIE (2), volume 6097 of Lecture Notes in Computer Science, page 143-152. Springer, (2010)Towards Minimal Addition Chains Using Ant Colony Optimisation., and . J. Math. Model. Algorithms, 5 (4): 525-543 (2006)A Fine-Grained Parallel Particle Swarm Optimization on Many-core and Multi-core Architectures., , and . PaCT, volume 10421 of Lecture Notes in Computer Science, page 215-224. Springer, (2017)Application-specific word embeddings for hate and offensive language detection., , , and . Multim. Tools Appl., 81 (19): 27111-27136 (2022)Robust distributed spatial clustering for swarm robotic based systems., , and . Appl. Soft Comput., (2017)A Novel CNN, Bidirectional Long-Short Term Memory, and Gated Recurrent Unit-Based Hybrid Approach for Human Activity Recognition., , , , , , , and . Int. J. Softw. Sci. Comput. Intell., 14 (1): 1-19 (2022)Efficient Hardware Implementation of Modular Multiplication and Exponentiation for Public-Key Cryptography., and . VECPAR, volume 2565 of Lecture Notes in Computer Science, page 451-463. Springer, (2002)