default search action
IET Computers & Digital Techniques, Volume 16
Volume 16, Number 1, January 2022
- Ramon Sanchez-Iborra, Antonio F. Skarmeta:
Who is wearing me? TinyDL-based user recognition in constrained personal devices. 1-9 - Shirisha Vadlamudi, Ali Ahmadinia:
An embedded intelligence engine for driver drowsiness detection. 10-18 - Mahbubeh Nazarloo, Meisam Yadollahzadeh Tabari, Homayun Motameni:
Online multi-object tracking based on time and frequency domain features. 19-28 - Jisu Kwon, Joonho Kong, Arslan Munir:
Sparse convolutional neural network acceleration with lossless input feature map compression for resource-constrained systems. 29-43
Volume 16, Numbers 2-3, May 2022
- Behnam Vakili, Morteza Gholipour:
Enhanced overloaded code division multiple access for network on chip. 45-63 - Ying Zhang, Sen Li, Xin Chen, Jiaqi Yao, Zhiming Mao, Jizhong Yang, Yifeng Hua:
Hybrid multi-level hardware Trojan detection platform for gate-level netlists based on XGBoost. 54-70 - Ashur Rafiev, Alex Yakovlev, Ghaith Tarawneh, Matthew Naylor, Simon W. Moore, David B. Thomas, Graeme M. Bragg, Mark Vousden, Andrew D. Brown:
Synchronization in graph analysis algorithms on the Partially Ordered Event-Triggered Systems many-core architecture. 71-88
Volume 16, Number 4, July 2022
- Geoff V. Merrett, Bernd-Christian Renner, Brandon Lucia:
Guest Editorial: Special issue on battery-free computing. 89-90 - Lars Hanschke, Christian Renner:
EmRep: Energy management relying on state-of-charge extrema prediction. 91-105 - Naomi Stricker, Reto Da Forno, Lothar Thiele:
Robustness of predictive energy harvesting systems: Analysis and adaptive prediction scaling. 106-124
- Mahsa Mohammadi, Hakem Beitollahi:
Q-scheduler: A temperature and energy-aware deep Q-learning technique to schedule tasks in real-time multiprocessor embedded systems. 125-140
Volume 16, Numbers 5-6, September 2022
- Mohammad Ali Ramazanzadeh, Behnam Barzegar, Homayun Motameni:
ASATM: Automated security assistant of threat models in intelligent transportation systems. 141-158 - Shabnam Mahjoub, Mehdi Golsorkhtabaramiri, Seyed Sadegh Salehi Amiri:
TLP: Towards three-level loop parallelisation. 159-171 - Kushal K. Ponugoti, Sudarshan K. Srinivasan, Scott C. Smith, Nimish Mathure:
Illegal Trojan design and detection in asynchronous NULL Convention Logic and Sleep Convention Logic circuits. 172-182 - Abbas Yaseri, Mohammad Hossein Maghami, Mehdi Radmehr:
A four-stage yield optimization technique for analog integrated circuits using optimal computing budget allocation and evolutionary algorithms. 183-195
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.