Search for persons
X
?
2024 IEEE Applied Power Electronics Conference and Exposition (APEC) ,
1
Practical Design Methodology for a High Efficiency LLC Conv..:
, In:
?
The Minerals, Metals & Materials Series; Light Metals 2024 ,
2
Effect of Silicon Content on Solidification Parameters and ..:
, In:
?
2022 IEEE 61st Conference on Decision and Control (CDC) ,
3
Global Monotonic Radio-Frequency Impedance Matching Via Con..:
, In:
?
2022 25th Euromicro Conference on Digital System Design (DSD) ,
4
Monitoring Framework to Support Mixed-Criticality Applicati..:
, In:
?
2022 American Control Conference (ACC) ,
5
Radio Frequency Impedance Matching Based on Control Lyapuno..:
, In:
?
Proceedings of the 15th ACM / IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM) ,
7
Why Some Bug-bounty Vulnerability Reports are Invalid? :..:
, In:
?
2021 IEEE International Conference on Automation/XXIV Congress of the Chilean Association of Automatic Control (ICA-ACCA) ,
8
A Droop Based Control Strategy for Bidirectional Power Regu..:
, In:
?
Contemporary Cardiology; Cardiovascular Disease in Racial and Ethnic Minority Populations ,
9
Cardiovascular Epidemiology in Hispanics/Latinos: Lessons L..:
, In:
?
2021 XLVII Latin American Computing Conference (CLEI) ,
10
An Early Alert System for Software Vulnerabilities based on..:
, In:
?
2021 IEEE Congreso Estudiantil de Electrónica y Electricidad (INGELECTRA) ,
11
Comparison of FCS-MPC and PI internal controllers for a Pri..:
, In:
?
Service-Oriented Computing – ICSOC 2020 Workshops; Lecture Notes in Computer Science ,
12
Security Professional Skills Representation in Bug Bounty P..:
, In:
?
Web Information Systems Engineering – WISE 2020; Lecture Notes in Computer Science ,
13
Automatic Action Extraction for Short Text Conversation Usi..:
, In:
?
The Shock Trauma Manual of Operative Techniques ,
15