Author of the publication

Alert Data Aggregation and Transmission Prioritization over Mobile Networks.

, , and . Network Science and Cybersecurity, volume 55 of Advances in Information Security, Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of a memristor based 1T1M crossbar architecture., , , , and . IJCNN, page 3243-3247. IEEE, (2011)Reconfigurable Memristor Based Computing Logic., and . Cybersecurity Systems for Human Cognition Augmentation, volume 61 of Advances in Information Security, Springer, (2014)Memristor SPICE Model Simulation and Device Hardware Correlation., , and . Cybersecurity Systems for Human Cognition Augmentation, volume 61 of Advances in Information Security, Springer, (2014)Memristors and the Future of Cyber Security Hardware., , , and . Network Science and Cybersecurity, volume 55 of Advances in Information Security, Springer, (2014)Emerging neuromorphic computing architectures & enabling hardware for cognitive information processing applications., , , , and . CIP, page 35-39. IEEE, (2010)Fast statistical model of TiO2 thin-film memristor and design implication., , and . ICCAD, page 345-352. IEEE Computer Society, (2011)A Parallel Neuromorphic Text Recognition System and Its Implementation on a Heterogeneous High-Performance Computing Cluster., , , , and . IEEE Trans. Computers, 62 (5): 886-899 (2013)Analysis of dynamic linear and non-linear memristor device models for emerging neuromorphic computing hardware design., , , and . IJCNN, page 1-5. IEEE, (2010)A columnar primary visual cortex (V1) model emulation using a PS3 Cell-BE array., , , and . IJCNN, page 1-8. IEEE, (2010)Neuromorphic Computing for Cognitive Augmentation in Cyber Defense., and . Cybersecurity Systems for Human Cognition Augmentation, volume 61 of Advances in Information Security, Springer, (2014)