Author of the publication

Synthesis and Direct Sampling of Single-Cycle Light Transients by Electron Tunneling in a Nanodevice

, , , , and . ACS photonics, (August 2023)
DOI: 10.1021/acsphotonics.3c00584

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Segmentation of the left ventricle in cardiac MRI using a hierarchical extreme learning machine model., , , , , , and . Int. J. Machine Learning & Cybernetics, 9 (10): 1741-1751 (2018)A Secure Virtual Machine Deployment Strategy to Reduce Co-residency in Cloud., , , , and . TrustCom/BigDataSE/ICESS, page 347-354. IEEE Computer Society, (2017)A new iterative synthetic data generation method for CNN based stroke gesture recognition., , , , , , and . Multimedia Tools Appl., 77 (13): 17181-17205 (2018)An Approach for Description of Computer Network Defense Scheme and Its Simulation Verification., , , , and . JCP, 9 (2): 388-395 (2014)Stability and Hopf bifurcation of a HIV infection model with CTL-response delay., , and . Computers & Mathematics with Applications, 62 (8): 3091-3102 (2011)Weighted Lee Algorithm on Rectilinear Steiner Tree with Obstacles and Boundary., and . CSIE (3), page 369-374. IEEE Computer Society, (2009)Static Compliance Checking beyond Separation of Duty Constraints., , , and . 3PGCIC, page 171-178. IEEE Computer Society, (2014)RestPL: Towards a Request-Oriented Policy Language for Arbitrary RESTful APIs., , , , and . ICWS, page 666-671. IEEE Computer Society, (2016)An Effective Android Software Reinforcement Scheme Based on Online Key., , , , and . HPCC/SmartCity/DSS, page 1544-1548. IEEE Computer Society, (2016)A spatial predator-prey system with non-renewable resources., , , , and . Applied Mathematics and Computation, (2019)