


default search action
IET Computers & Digital Techniques, Volume 16
Volume 16, Number 1, January 2022
- Ramon Sanchez-Iborra

, Antonio F. Skarmeta:
Who is wearing me? TinyDL-based user recognition in constrained personal devices. 1-9 - Shirisha Vadlamudi, Ali Ahmadinia

:
An embedded intelligence engine for driver drowsiness detection. 10-18 - Mahbubeh Nazarloo, Meisam Yadollahzadeh Tabari

, Homayun Motameni:
Online multi-object tracking based on time and frequency domain features. 19-28 - Jisu Kwon, Joonho Kong

, Arslan Munir
:
Sparse convolutional neural network acceleration with lossless input feature map compression for resource-constrained systems. 29-43
Volume 16, Numbers 2-3, May 2022
- Behnam Vakili, Morteza Gholipour

:
Enhanced overloaded code division multiple access for network on chip. 45-63 - Ying Zhang

, Sen Li, Xin Chen, Jiaqi Yao, Zhiming Mao, Jizhong Yang, Yifeng Hua:
Hybrid multi-level hardware Trojan detection platform for gate-level netlists based on XGBoost. 54-70 - Ashur Rafiev

, Alex Yakovlev
, Ghaith Tarawneh, Matthew Naylor
, Simon W. Moore
, David B. Thomas
, Graeme M. Bragg
, Mark Vousden
, Andrew D. Brown:
Synchronization in graph analysis algorithms on the Partially Ordered Event-Triggered Systems many-core architecture. 71-88
Volume 16, Number 4, July 2022
- Geoff V. Merrett, Bernd-Christian Renner, Brandon Lucia:

Guest Editorial: Special issue on battery-free computing. 89-90 - Lars Hanschke

, Christian Renner:
EmRep: Energy management relying on state-of-charge extrema prediction. 91-105 - Naomi Stricker

, Reto Da Forno, Lothar Thiele:
Robustness of predictive energy harvesting systems: Analysis and adaptive prediction scaling. 106-124
- Mahsa Mohammadi, Hakem Beitollahi

:
Q-scheduler: A temperature and energy-aware deep Q-learning technique to schedule tasks in real-time multiprocessor embedded systems. 125-140
Volume 16, Numbers 5-6, September 2022
- Mohammad Ali Ramazanzadeh, Behnam Barzegar

, Homayun Motameni:
ASATM: Automated security assistant of threat models in intelligent transportation systems. 141-158 - Shabnam Mahjoub

, Mehdi Golsorkhtabaramiri
, Seyed Sadegh Salehi Amiri:
TLP: Towards three-level loop parallelisation. 159-171 - Kushal K. Ponugoti

, Sudarshan K. Srinivasan, Scott C. Smith, Nimish Mathure
:
Illegal Trojan design and detection in asynchronous NULL Convention Logic and Sleep Convention Logic circuits. 172-182 - Abbas Yaseri, Mohammad Hossein Maghami

, Mehdi Radmehr:
A four-stage yield optimization technique for analog integrated circuits using optimal computing budget allocation and evolutionary algorithms. 183-195

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














