Author of the publication

Cross-layer Designs against Non-ideal Effects in ReRAM-based Processing-in-Memory System.

, , , , , and . ISQED, page 1-6. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Taxonomy of Coordination Models Based on Interactive Types., and . IC-AI, page 56-60. CSREA Press, (2006)Evaluation method for node importance based on node condensation in terrorism networks., , , , and . ISI, page 193. IEEE, (2012)Efficient Conditional Privacy-Preserving Authentication Scheme Using Revocation Messages for VANET., , , , and . ICCCN, page 1-8. IEEE, (2018)Sneak-Path Based Test and Diagnosis for 1R RRAM Crossbar Using Voltage Bias Technique., , , , and . DAC, page 38:1-38:6. ACM, (2017)Large Scale Comparison of Gene Expression Levels by Microarrays and RNAseq Using TCGA Data, , , , , and . PLOS ONE, 8 (8): 1-10 (August 2013)The Probability of Dual Hesitant Fuzzy Event and Its Applications to Bayesian Network Inferences., , , and . ICNC-FSKD, volume 1074 of Advances in Intelligent Systems and Computing, page 736-755. Springer, (2019)Indoor Localization within Multi-Story Buildings Using MAC and RSSI Fingerprint Vectors., , , , , and . Sensors, 19 (11): 2433 (2019)A novel approach to analyze the result of polygraph., , and . SMC, page 2884-2886. IEEE, (2000)Design and development of a 7-DOF humanoid arm., , , and . ROBIO, page 277-282. IEEE, (2012)Methodological Framework for the Transition from Requirements to Software Architectures., , and . ISD, page 139-151. Springer, (2012)