Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A high performance front end for MEG II tracker., , , , , , , and . IWASI, page 55-57. IEEE, (2015)A new assembly technique of full stereo Drift Chamber for high energy physics experiments., , , , , , , , , and 1 other author(s). IWASI, page 68-71. IEEE, (2015)Voltage control system for a Multigap Resistive Plate Chambers telescope., , , and . IWASI, page 72-74. IEEE, (2015)A comparative study of electronic stethoscopes for cardiac auscultation., , , , , and . EMBC, page 2610-2613. IEEE, (2017)The DAQ system for CORAM (COsmic RAy Mission) experiment., , , , , and . IWASI, page 79-81. IEEE, (2015)The ExaNeSt Project: Interconnects, Storage, and Packaging for Exascale Systems., , , , , , , , , and 17 other author(s). DSD, page 60-67. IEEE Computer Society, (2016)Rack-scale disaggregated cloud data centers: The dReDBox project vision., , , , , , , , , and 6 other author(s). DATE, page 690-695. IEEE, (2016)Analyticity and Gevrey class regularity for a Kuramoto-Sivashinsky equation in space dimension two.. Appl. Math. Lett., 14 (2): 253-260 (2001)Non-Coherent UWB Communication in the Presence of Multiple Narrowband Interferers., , , , and . IEEE Trans. Wireless Communications, 9 (11): 3365-3379 (2010)Measuring the Risk-Based Value of IT Security Solutions., , , , and . IT Professional, 6 (6): 35-42 (2004)