Search for persons
X
?
2024 IEEE International Solid-State Circuits Conference (ISSCC) ,
1
13.2 A 32Gb 8.0Gb/s/pin DDR5 SDRAM with a Symmetric-Mosaic ..:
, In:
?
2022 IEEE International Solid- State Circuits Conference (ISSCC) ,
2
A 192-Gb 12-High 896-GB/s HBM3 DRAM with a TSV Auto-Calibra..:
, In:
?
2014 World Automation Congress (WAC) ,
3
Levitation control design of super-speed Maglev trains:
, In:
?
2012 19th IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits ,
4
Failure analysis of latent damage in low temperature poly-s..:
, In:
?
Scientific Bases for the Preparation of Heterogeneous Catalysts - Proceedings of the 10th International Symposium, Louvain-la-Neuve, Belgium, July 11-15, 2010; Studies in Surface Science and Catalysis ,
5
Advanced photocatalytic activity using TiO2/ceramic fiber-b..:
, In:
?
2020 IEEE International Ultrasonics Symposium (IUS) ,
6
Detection of Micro-scaled Flaws in the Steel Sheet using Li..:
, In:
?
2016 IEEE Power and Energy Society General Meeting (PESGM) ,
8
An optimal composition and placement of automatic switches ..:
, In:
?
Proceedings of the 5th International ICST Conference on Simulation Tools and Techniques ,
9
Performance analysis of the IEEE 802.1 ethernet audio/video..:
, In:
?
Proceedings of the 48th Design Automation Conference ,
10
Challenges in a future IP/ethernet-based in-car network for..:
, In:
?
Proceedings of the 5th International Conference on Communication System Software and Middleware ,
11
Practical experiences on a communication middleware for IP-..:
, In:
?
Communications in Computer and Information Science; Methods and Applications for Modeling and Simulation of Complex Systems ,
12
A Study on SES-Based Information Security Framework for Aut..:
, In:
?
2020 International Conference on Software Security and Assurance (ICSSA) ,
13
Blockchain-based Service Performance Evaluation Method Usin..:
, In:
?
2018 International Conference on Software Security and Assurance (ICSSA) ,
14
A Study on Document Password Management using the Trust-Cha..:
, In:
?
2018 International Conference on Software Security and Assurance (ICSSA) ,
15