default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 61 matches
- 2021
- Yuntao Liu, Michael Zuzak, Yang Xie, Abhishek Chakraborty, Ankur Srivastava:
Robust and Attack Resilient Logic Locking with a High Application-Level Impact. ACM J. Emerg. Technol. Comput. Syst. 17(3): 37:1-37:22 (2021) - Shashank Adavally, Mahzabeen Islam, Krishna Kavi:
Dynamically Adapting Page Migration Policies Based on Applications' Memory Access Behaviors. ACM J. Emerg. Technol. Comput. Syst. 17(2): 16:1-16:24 (2021) - Md Musabbir Adnan, Sagarvarma Sayyaparaju, Samuel D. Brown, Mst Shamim Ara Shawkat, Catherine D. Schuman, Garrett S. Rose:
Design of a Robust Memristive Spiking Neuromorphic System with Unsupervised Learning in Hardware. ACM J. Emerg. Technol. Comput. Syst. 17(4): 56:1-56:26 (2021) - Manaar Alam, Sarani Bhattacharya, Debdeep Mukhopadhyay:
Victims Can Be Saviors: A Machine Learning-based Detection for Micro-Architectural Side-Channel Attacks. ACM J. Emerg. Technol. Comput. Syst. 17(2): 14:1-14:31 (2021) - Qutaiba Alasad, Jie Lin, Jiann-Shuin Yuan, Deliang Fan, Amro Awad:
Resilient and Secure Hardware Devices Using ASL. ACM J. Emerg. Technol. Comput. Syst. 17(2): 11:1-11:26 (2021) - K. A. Asha, Li En Hsu, Abhishek Patyal, Hung-Ming Chen:
Improving the Quality of FPGA RO-PUF by Principal Component Analysis (PCA). ACM J. Emerg. Technol. Comput. Syst. 17(3): 34:1-34:25 (2021) - Alexis Asseman, Nicolas Antoine, Ahmet S. Ozcan:
Accelerating Deep Neuroevolution on Distributed FPGAs for Reinforcement Learning Problems. ACM J. Emerg. Technol. Comput. Syst. 17(2): 21:1-21:17 (2021) - Michiel Van Beirendonck, Jan-Pieter D'Anvers, Angshuman Karmakar, Josep Balasch, Ingrid Verbauwhede:
A Side-Channel-Resistant Implementation of SABER. ACM J. Emerg. Technol. Comput. Syst. 17(2): 10:1-10:26 (2021) - Lauren Biernacki, Mark Gallagher, Zhixing Xu, Misiker Tadesse Aga, Austin Harris, Shijia Wei, Mohit Tiwari, Baris Kasikci, Sharad Malik, Todd M. Austin:
Software-driven Security Attacks: From Vulnerability Sources to Durable Hardware Defenses. ACM J. Emerg. Technol. Comput. Syst. 17(3): 42:1-42:38 (2021) - Saman Biookaghazadeh, Pravin Kumar Ravi, Ming Zhao:
Toward Multi-FPGA Acceleration of the Neural Networks. ACM J. Emerg. Technol. Comput. Syst. 17(2): 25:1-25:23 (2021) - Ulbert J. Botero, Ronald Wilson, Hangwei Lu, Mir Tanjidur Rahman, Mukhil A. Mallaiyan, Fatemeh Ganji, Navid Asadizanjani, Mark M. Tehranipoor, Damon L. Woodard, Domenic Forte:
Hardware Trust and Assurance through Reverse Engineering: A Tutorial and Outlook from Image Analysis and Machine Learning Perspectives. ACM J. Emerg. Technol. Comput. Syst. 17(4): 62:1-62:53 (2021) - Eros Camacho-Ruiz, Santiago Sánchez-Solano, Piedad Brox, Macarena C. Martínez-Rodríguez:
Timing-Optimized Hardware Implementation to Accelerate Polynomial Multiplication in the NTRU Algorithm. ACM J. Emerg. Technol. Comput. Syst. 17(3): 35:1-35:16 (2021) - Anwesha Chatterjee, Shouvik Musavvir, Ryan Gary Kim, Janardhan Rao Doppa, Partha Pratim Pande:
Power Management of Monolithic 3D Manycore Chips with Inter-tier Process Variations. ACM J. Emerg. Technol. Comput. Syst. 17(2): 13:1-13:19 (2021) - Yiran Chen, Qinru Qiu, Yingyan Lin:
Introduction of Special Issue on Hardware and Algorithms for Efficient Machine Learning-Part 1. ACM J. Emerg. Technol. Comput. Syst. 17(2): 18:1-18:2 (2021) - Yiran Chen, Qinru Qiu, Yingyan Lin:
Introduction to the Special Issue on Hardware and Algorithms for Efficient Machine Learning - Part 2. ACM J. Emerg. Technol. Comput. Syst. 17(4): 45:1-45:2 (2021) - Wentao Chen, Hailong Qiu, Jian Zhuang, Chutong Zhang, Yu Hu, Qing Lu, Tianchen Wang, Yiyu Shi, Meiping Huang, Xiaowei Xu:
Quantization of Deep Neural Networks for Accurate Edge Computing. ACM J. Emerg. Technol. Comput. Syst. 17(4): 54:1-54:11 (2021) - Dharanidhar Dang, Sai Vineel Reddy Chittamuru, Sudeep Pasricha, Rabi N. Mahapatra, Debashis Sahoo:
BPLight-CNN: A Photonics-Based Backpropagation Accelerator for Deep Learning. ACM J. Emerg. Technol. Comput. Syst. 17(4): 49:1-49:26 (2021) - Palash Das, Hemangee K. Kapoor:
CLU: A Near-Memory Accelerator Exploiting the Parallelism in Convolutional Neural Networks. ACM J. Emerg. Technol. Comput. Syst. 17(2): 22:1-22:25 (2021) - Sumon Dey, Lee Baker, Joshua Schabel, Weifu Li, Paul D. Franzon:
A Scalable Cluster-based Hierarchical Hardware Accelerator for a Cortically Inspired Algorithm. ACM J. Emerg. Technol. Comput. Syst. 17(4): 52:1-52:29 (2021) - Tapobrata Dhar, Surajit Kumar Roy, Chandan Giri:
Hardware Trojan Horse Detection through Improved Switching of Dormant Nets. ACM J. Emerg. Technol. Comput. Syst. 17(3): 33:1-33:22 (2021) - Adi Eliahu, Ronny Ronen, Pierre-Emmanuel Gaillardon, Shahar Kvatinsky:
multiPULPly: A Multiplication Engine for Accelerating Neural Networks on Ultra-low-power Architectures. ACM J. Emerg. Technol. Comput. Syst. 17(2): 24:1-24:27 (2021) - Domenic Forte, Debdeep Mukhopadhyay, Ilia Polian, Yunsi Fei, Rosario Cammarota:
Introduction to the Special Issue on Emerging Challenges and Solutions in Hardware Security. ACM J. Emerg. Technol. Comput. Syst. 17(3): 29:1-29:4 (2021) - Victor M. Gan, Yibin Liang, Lianjun Li, Lingjia Liu, Yang Yi:
A Cost-Efficient Digital ESN Architecture on FPGA for OFDM Symbol Detection. ACM J. Emerg. Technol. Comput. Syst. 17(4): 47:1-47:15 (2021) - Shijun Gong, Jiajun Li, Wenyan Lu, Guihai Yan, Xiaowei Li:
ShuntFlowPlus: An Efficient and Scalable Dataflow Accelerator Architecture for Stream Applications. ACM J. Emerg. Technol. Comput. Syst. 17(4): 59:1-59:24 (2021) - Chuliang Guo, Li Zhang, Xian Zhou, Grace Li Zhang, Bing Li, Weikang Qian, Xunzhao Yin, Cheng Zhuo:
A Reconfigurable Multiplier for Signed Multiplications with Asymmetric Bit-Widths. ACM J. Emerg. Technol. Comput. Syst. 17(4): 48:1-48:16 (2021) - Noor Ahmad Hazari, Ahmed Oun, Mohammed Y. Niamat:
Machine Learning Vulnerability Analysis of FPGA-based Ring Oscillator PUFs and Counter Measures. ACM J. Emerg. Technol. Comput. Syst. 17(3): 36:1-36:20 (2021) - Morteza Hosseini, Tinoosh Mohsenin:
Binary Precision Neural Network Manycore Accelerator. ACM J. Emerg. Technol. Comput. Syst. 17(2): 19:1-19:27 (2021) - Mohit Khatwani, Hasib-Al Rashid, Hirenkumar Paneliya, Mark Horton, Nicholas R. Waytowich, W. David Hairston, Tinoosh Mohsenin:
A Flexible Multichannel EEG Artifact Identification Processor using Depthwise-Separable Convolutional Neural Networks. ACM J. Emerg. Technol. Comput. Syst. 17(2): 23:1-23:21 (2021) - Heewoo Kim, Aporva Amarnath, Javad Bagherzadeh, Nishil Talati, Ronald G. Dreslinski:
A Survey Describing Beyond Si Transistors and Exploring Their Implications for Future Processors. ACM J. Emerg. Technol. Comput. Syst. 17(3): 27:1-27:44 (2021) - Sourabh Kulkarni, Sachin Bhat, Csaba Andras Moritz:
Architecting for Artificial Intelligence with Emerging Nanotechnology. ACM J. Emerg. Technol. Comput. Syst. 17(3): 26:1-26:33 (2021)
skipping 31 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-18 11:53 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint