Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stepwise Folding and Self-Assembly of a Merocyanine Folda-Pentamer, , and . J. Am. Chem. Soc., 142 (7): 3321-3325 (February 2020)Efficient Exploitation of Noise Leakage for Template Attack., , , , and . IEEE Embed. Syst. Lett., 15 (3): 161-164 (September 2023)Power analysis based reverse engineering on the secret round function of block ciphers., , , , , and . Concurr. Comput. Pract. Exp., 26 (8): 1531-1545 (2014)An Efficient Implementation of Singular Value Decomposition Rotation Transformations with CORDIC Processors., , and . J. Parallel Distributed Comput., 17 (4): 360-362 (1993)Efficient list-approximation techniques for floorplan area minimization., , and . ACM Trans. Design Autom. Electr. Syst., 6 (3): 372-400 (2001)Building Category Graphs Representation with Spatial and Temporal Attention for Visual Navigation., , , , , and . CoRR, (2023)Determining an Optimal Penetration Among Weighted Regions in Two and Three Dimensions., , , , and . J. Comb. Optim., 5 (1): 59-79 (2001)Skill-Based Hierarchical Reinforcement Learning for Target Visual Navigation., , , , and . IEEE Trans. Multim., (2023)PyramidFlow: High-Resolution Defect Contrastive Localization Using Pyramid Normalizing Flow., , , and . CVPR, page 14143-14152. IEEE, (2023)Scheduling for power reduction in a real-time system., , , , and . ISLPED, page 84-87. ACM, (1997)