


default search action
ACM Journal on Emerging Technologies in Computing Systems, Volume 21
Volume 21, Number 1, January 2025
- Antika Roy

, Md Mahfuz Al Hasan
, Shajib Ghosh
, Nitin Varshney
, Jake Julia
, Reza Forghani
, Navid Asadizanjani
:
Applications and Challenges of AI in PCB X-ray Inspection: A Comprehensive Study. 1:1-1:28 - Mona Hashemi

, Siamak Mohammadi
, Trevor E. Carlson
:
SRLL: Improving Security and Reliability with User-Defined Constraint-Aware Logic Locking. 2:1-2:27 - Jacob N. Lenz

, Scott K. Perryman
, Dmitro J. Martynowych
, David A. Hopper
, Sean M. Oliver
:
Hardware Trojan Detection Potential and Limits with the Quantum Diamond Microscope. 3:1-3:24
Volume 21, Number 2, April 2025
- Shih-Han Chang

, Ray-Hong Yen
, Chien-Nan Liu
:
Error-Aware Training for In-RRAM Computing Design Considering Non-Ideal Effects in RRAM Crossbar Array and Peripheral Circuits. 4:1-4:22 - Amit Puri

, John Jose
, Venkatesh Tamarapalli
:
CosMoS: Architectural Support for Cost-Effective Data Movement in a Disaggregated Memory Systems. 5:1-5:22 - Abhoy Kole

, Mohammed E. Djeridane
, Lennart Weingarten
, Kamalika Datta
, Rolf Drechsler
:
qSAT: Design of an Efficient Quantum Satisfiability Solver for Hardware Equivalence Checking. 6:1-6:15
Volume 21, Number 3, July 2025
- Swapnil Bhatia

, Miriam Ramliden
, Vibha Rao
, Grace Vezeau
, Nina Katz-Christy
, Seth Tolkamp
, Matthew O'Leary
, Hannah Jayne
, Tyler Rockwood
, Rithika Raj Kumar Pradeep
, Chaitanya Joshi
, Cat Ferrieri
, Laurel Provencher
, Gabriella Davis
, Dasith Perera
, Emily Greenwald
, James Loomis
, Phyllis Gitobu
, David Kleiman
, Sean Mihm
, David Turek
, Hyunjun Park
:
Demonstration of a Scalable DNA Computing Platform: Writing and Selection. 7:1-7:28 - Sandeep Sunkavilli

, Mashrafi Alam Kajol
, Qiaoyan Yu
:
S2FAM: Signal-slowdown-based Fault Attack Mitigation Method for Secure Multi-tenant FPGA. 8:1-8:25 - Sheng Lu

, Liuting Shang
, Sungyong Jung
, Yichen Zhang
, Qilian Liang
, Chenyun Pan
:
Technology/System Co-Optimization for FPGA Using Emerging Reconfigurable Logic Device. 9:1-9:21 - Ashutosh Ghimire

, Mohammed Alkurdi
, Md. Tauhidur Rahman
, Saraju P. Mohanty
, Fathi H. Amsaad
:
A Golden-Free Unsupervised ML-Assisted Security Approach for Detection of IC Hardware Trojans. 10:1-10:22
Volume 21, Number 4, October 2025
- Md. Mashfiq Rizvee, Fairuz Shadmani Shishir, Tanvir Hossain, Tamzidul Hoque, Domenic Forte, Sumaiya Shomaji:

A Persistent Hierarchical Bloom Filter-based Framework for Scalable Authentication and Tracking of ICs. 11:1-11:22 - Md. Sadik Awal, Md. Tauhidur Rahman:

Impedance Leakage Vulnerability and Its Utilization in Reverse-Engineering Embedded Software. 12:1-12:20 - Haodong Sun, Zhi Yang, Shuyuan Jin, Zhenlong Zhang:

SHIFT: Selective Hardware Information Flow Tracking Driven by Deterministic Constraints. 13:1-13:16 - Shreyas Deshmukh, Raghav Singhal, Shruti Landge, Vivek Saraswat, Anmol Biswas, Abhishek Kadam, Ajay Kumar Singh, Sreenivas Subramoney, Laxmeesha Somappa, Maryam Shojaei Baghini, Udayan Ganguly:

Analog and Temporary On-chip Memory for ANN Training and Inference. 14:1-14:18

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














