Author of the publication

Research on Simulation Control and Implementation of Network-Based Dual CAN Communication for Ring Network Cabinet.

, , and . icWCSN, page 93-97. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Image reconstruction in SPECT with a half detector., , and . Medical Imaging: Image Processing, volume 4684 of SPIE Proceedings, SPIE, (2002)Data redundancy and reduced-scan reconstruction in reflectivity tomography., , and . IEEE Trans. Image Processing, 12 (7): 784-795 (2003)PBI function based evolutionary algorithm with precise penalty parameter for unconstrained many-objective optimization., , and . Swarm Evol. Comput., (2019)A language model approach to capture commercial intent and information relevance for sponsored search., , and . CIKM, page 599-604. ACM, (2011)A 1.6 mW 320×240-pixel vision sensor with programmable dynamic background rejection and motion detection., , , , and . IEEE SENSORS, page 1-3. IEEE, (2017)Image reconstruction of reflectivity from short scan data., , and . ISBI, page 1027-1030. IEEE, (2002)HMT: A Hardware-Centric Hybrid Bonsai Merkle Tree Algorithm for High-Performance Authentication., , , , and . FPGA, page 52. ACM, (2022)FERMAT: FPGA-Accelerated Heterogeneous Computing Platform Near NVMe Storage., and . FCCM, page 262. IEEE, (2021)OMT: A Run-time Adaptive Architectural Framework for Bonsai Merkle Tree-Based Secure Authentication with Embedded Heterogeneous Memory., , , and . HOST, page 191-202. IEEE, (2023)Critical Node Identification for Power Communication Networks Based on an Improved Structural Hole Algorithm., , , , , and . ACIRS, page 135-139. IEEE, (2023)