Author of the publication

First-principles study of two-dimensional electron and hole gases at the head-to-head and tail-to-tail $180^\circ$ domain walls in $PbTiO_3$ ferroelectric thin films

, , , , and . Phys. Rev. B, 101 (17): 174114 (May 2020)
DOI: 10.1103/PhysRevB.101.174114

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Domain walls in a perovskite oxide with two primary structural order parameters: First-principles study of BiFeO 3, , , and . Physical Review B, 87 (2): 024102 (2013)First-principles study of two-dimensional electron and hole gases at the head-to-head and tail-to-tail $180^\circ$ domain walls in $PbTiO_3$ ferroelectric thin films, , , , and . Phys. Rev. B, 101 (17): 174114 (May 2020)The SIESTA method for ab initio order- N materials simulation, , , , , , and . Journal of Physics: Condensed Matter, 14 (11): 2745 (2002)Masking and Transformer-based Models for Hyperpartisanship Detection in News., , , and . RANLP, page 1244-1251. INCOMA Ltd., (2021)Character N-Grams for Detecting Deceptive Controversial Opinions., , , and . CLEF, volume 11018 of Lecture Notes in Computer Science, page 135-140. Springer, (2018)Overview of the Track on Author Profiling and Deception Detection in Arabic., , , , , and . FIRE (Working Notes), volume 2517 of CEUR Workshop Proceedings, page 70-83. CEUR-WS.org, (2019)Security and privacy issues of data-over-sound technologies used in IoT healthcare devices., , , , and . GLOBECOM (Workshops), page 1-6. IEEE, (2021)Interconnection Between Darknets., , , and . IEEE Internet Comput., 25 (3): 61-70 (2021)Bots and Gender Profiling using Masking Techniques., , , , and . CLEF (Working Notes), volume 2380 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)A Framework for BYOD Continuous Authentication: Case Study with Soft-Keyboard Metrics for Healthcare Environment., , , and . ICAI, volume 1277 of Communications in Computer and Information Science, page 347-358. Springer, (2020)