Author of the publication

SWEVM: a software EVM for embedded system programming.

, , and . ICPADS, page 1-7. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards human-like and transhuman perception in AI 2.0: a review., , , , , , , , , and 3 other author(s). Frontiers of IT & EE, 18 (1): 58-67 (2017)Session details: Session 2: Short Oral Session.. CEA@ICMR, ACM, (2019)Feature-based initial population generation for the optimization of job shop problems., , , and . Journal of Zhejiang University - Science C, 11 (10): 767-777 (2010)Disc cutters plane layout design of the full-face rock tunnel boring machine (TBM) based on different layout patterns., , , and . Computers & Industrial Engineering, 61 (4): 1209-1225 (2011)A Projection Pursuit Based Risk Assessment Method in Mobile Ad hoc Networks., , , , and . Int. J. Computational Intelligence Systems, 4 (5): 749-758 (2011)Coordinating a decentralized supply chain with customer returns and price-dependent stochastic demand using a buyback policy., and . European Journal of Operational Research, 212 (2): 293-300 (2011)The impact of sharing customer returns information in a supply chain with and without a buyback policy.. European Journal of Operational Research, 213 (3): 478-488 (2011)An Adaptive Spatio-Temporal Error Concealment Scheme Based on H.264/AVC., , , , and . Journal of Multimedia, 6 (3): 293-299 (2011)Normalized SAD Method for Chinese Document Image Registration., , , and . Journal of Multimedia, 8 (2): 121-128 (2013)Exposing Digital Video Logo-Removal Forgery by Inconsistency of Blur., , , , and . IJPRAI, 24 (7): 1027-1046 (2010)