


default search action
ACM Transactions on Embedded Computing Systems, Volume 18
Volume 18, Number 1, February 2019
- Sandeep K. Shukla:

Editorial: Human Factors in Embedded Computing.
- Patricia Derler, Klaus Schneider

, Jean-Pierre Talpin:
Guest Editorial: Special Issue of ACM TECS on the ACM-IEEE International Conference on Formal Methods and Models for System Design (MEMOCODE 2017). 1:1-1:2 - Pierluigi Nuzzo

, Jiwei Li, Alberto L. Sangiovanni-Vincentelli, Yugeng Xi, Dewei Li:
Stochastic Assume-Guarantee Contracts for Cyber-Physical System Design. 2:1-2:26 - Guillaume Plassan

, Katell Morin-Allory, Dominique Borrione:
Mining Missing Assumptions from Counter-Examples. 3:1-3:25 - Andreas Fellner

, Willibald Krenn, Rupert Schlick
, Thorsten Tarrach
, Georg Weissenbacher
:
Model-based, Mutation-driven Test-case Generation Via Heuristic-guided Branching Search. 4:1-4:28 - Stephen A. Edwards

, Richard Townsend
, Martha Barker, Martha A. Kim
:
Compositional Dataflow Circuits. 5:1-5:27 - Thomas N. Reynolds, Adam M. Procter, William L. Harrison, Gerard Allwein:

The Mechanized Marriage of Effects and Monads with Applications to High-assurance Hardware. 6:1-6:26 - Sudipta Chattopadhyay, Moritz Beck, Ahmed Rezine, Andreas Zeller

:
Quantifying the Information Leakage in Cache Attacks via Symbolic Execution. 7:1-7:27
- Taeju Park

, Kang G. Shin:
EACAN: Reliable and Resource-Efficient CAN Communications. 8:1-8:23 - Daniel J. Pederson

, Christopher J. Quinkert, Muhammad A. Arafat, Jesse P. Somann, Jack D. Williams, Rebecca A. Bercich, Zhi Wang, Gabriel O. Albors, John G. R. Jefferys, Pedro P. Irazoqui
:
The Bionode: A Closed-Loop Neuromodulation Implant. 9:1-9:20 - Vanchinathan Venkataramani

, Mun Choon Chan, Tulika Mitra
:
Scratchpad-Memory Management for Multi-Threaded Applications on Many-Core Architectures. 10:1-10:28 - Abhishek Rhisheekesan

, Reiley Jeyapaul, Aviral Shrivastava
:
Control Flow Checking or Not? (for Soft Errors). 11:1-11:25
Volume 18, Number 2, April 2019
- Debapriya Basu Roy

, Shivam Bhasin, Ivica Nikolic, Debdeep Mukhopadhyay:
Combining PUF with RLUTs: A Two-party Pay-per-device IP Licensing Scheme on FPGAs. 12:1-12:22 - Guanwen Zhong

, Akshat Dubey, Cheng Tan
, Tulika Mitra
:
Synergy: An HW/SW Framework for High Throughput CNNs on Embedded Heterogeneous SoC. 13:1-13:23 - Krishnendu Guha

, Debasri Saha, Amlan Chakrabarti
:
Stigmergy-Based Security for SoC Operations From Runtime Performance Degradation of SoC Components. 14:1-14:26 - Alif Ahmed

, Yuanwen Huang
, Prabhat Mishra
:
Cache Reconfiguration Using Machine Learning for Vulnerability-aware Energy Optimization. 15:1-15:24 - George Lentaris

, Konstantinos Maragos, Dimitrios Soudris
, Xenophon Zabulis
, Manolis I. A. Lourakis:
Single- and Multi-FPGA Acceleration of Dense Stereo Vision for Planetary Rovers. 16:1-16:27 - Salah S. Harb

, Moath H. A. Jarrah
:
FPGA Implementation of the ECC Over GF(2m) for Small Embedded Applications. 17:1-17:19 - Abbas Arghavani, Haibo Zhang

, Zhiyi Huang, Yawen Chen
:
Chimp: A Learning-based Power-aware Communication Protocol for Wireless Body Area Networks. 18:1-18:26
Volume 18, Number 3, June 2019
- Sandeep K. Shukla:

Editorial: Reflections on the History of Cyber-Physical versus Embedded Systems. - Zhe Jiang

, Neil C. Audsley, Pan Dong:
BlueIO: A Scalable Real-Time Hardware I/O Virtualization System for Many-core Embedded Systems. 19:1-19:25 - Farid Molazem Tabrizi, Karthik Pattabiraman:

Design-Level and Code-Level Security Analysis of IoT Devices. 20:1-20:25 - Bruce Belson

, Jason Holdsworth
, Wei Xiang
, Bronson Philippa
:
A Survey of Asynchronous Programming Using Coroutines in the Internet of Things and Embedded Systems. 21:1-21:21
- Lejla Batina, Sherman S. M. Chow

, Gerhard P. Hancke
, Zhe Liu:
Introduction to the Special Issue on Cryptographic Engineering for Internet of Things: Security Foundations, Lightweight Solutions, and Attacks. 22:1-22:3 - Lu Zhou, Chunhua Su, Zhi Hu, Sokjoon Lee

, Hwajeong Seo:
Lightweight Implementations of NIST P-256 and SM2 ECC on 8-bit Resource-Constraint Embedded Device. 23:1-23:13 - Furkan Turan

, Ingrid Verbauwhede
:
Compact and Flexible FPGA Implementation of Ed25519 and X25519. 24:1-24:21 - Weiqiang Liu

, Lei Zhang, Zhengran Zhang, Chongyan Gu, Chenghua Wang, Máire O'Neill, Fabrizio Lombardi:
XOR-Based Low-Cost Reconfigurable PUFs for IoT Security. 25:1-25:21 - Robert P. Lee

, Konstantinos Markantonakis
, Raja Naeem Akram
:
Ensuring Secure Application Execution and Platform-Specific Execution in Embedded Devices. 26:1-26:21 - Amina Cherif, Malika Belkadi, Damien Sauveron

:
A Lightweight and Secure Data Collection Serverless Protocol Demonstrated in an Active RFIDs Scenario. 27:1-27:27 - Lu Zhou, Chunhua Su, Kuo-Hui Yeh:

A Lightweight Cryptographic Protocol with Certificateless Signature for the Internet of Things. 28:1-28:10 - Letian Sha, Fu Xiao, Haiping Huang, Yu Chen, Ruchuan Wang:

Catching Escapers: A Detection Method for Advanced Persistent Escapers in Industry Internet of Things Based on Identity-based Broadcast Encryption (IBBE). 29:1-29:25
Volume 18, Number 4, August 2019
- Sandeep K. Shukla:

Editorial: Adversaries and Robustness. - Rehan Ahmed, Bernhard Buchli, Stefan Draskovic, Lukas Sigrist

, Pratyush Kumar, Lothar Thiele:
Optimal Power Management with Guaranteed Minimum Energy Utilization for Solar Energy Harvesting Systems. 30:1-30:26 - Daibo Liu

, Zhichao Cao, Mingyan Liu, Mengshu Hou
, Hongbo Jiang:
Contention-Detectable Mechanism for Receiver-Initiated MAC. 31:1-31:27 - Xiaokang Wang, Laurence T. Yang

, Hongguo Li, Man Lin, Jianjun Han, Bernady O. Apduhan:
NQA: A Nested Anti-collision Algorithm for RFID Systems. 32:1-32:21 - Fang Su, Yongpan Liu, Xiao Sheng, Hyung Gyu Lee, Naehyuck Chang, Huazhong Yang:

A Task Failure Rate Aware Dual-Channel Solar Power System for Nonvolatile Sensor Nodes. 33:1-33:21 - Mounika Ponugoti, Aleksandar Milenkovic

:
Enabling On-the-Fly Hardware Tracing of Data Reads in Multicores. 34:1-34:27 - Zaid Al-bayati

, Youcheng Sun
, Haibo Zeng, Marco Di Natale, Qi Zhu, Brett H. Meyer:
Partitioning and Selection of Data Consistency Mechanisms for Multicore Real-Time Systems. 35:1-35:28 - Gaddiel Desirena-Lopez, Antonio Ramírez-Treviño

, José Luis Briz
, Carlos Renato Vázquez, David Gómez-Gutiérrez:
Thermal-aware Real-time Scheduling Using Timed Continuous Petri Nets. 36:1-36:24 - Marcelo Ruaro

, Axel Jantsch
, Fernando Gehm Moraes
:
Self-Adaptive QoS Management of Computation and Communication Resources in Many-Core SoCs. 37:1-37:21 - G. G. Md. Nawaz Ali

, Md. Noor-A-Rahim, Md. Ashiqur Rahman, Beshah Ayalew, Peter H. J. Chong, Yong Liang Guan:
Cooperative Cache Transfer-based On-demand Network Coded Broadcast in Vehicular Networks. 38:1-38:20
Volume 18, Number 5, October 2019
- Yu-Chieh Chen, Chin-Chen Chang, Ramesh Perumal

, Shih-Rung Yeh, Yen-Chung Chang, Hsin Chen:
Optimization and Implementation of Wavelet-based Algorithms for Detecting High-voltage Spindles in Neuron Signals. 39:1-39:16 - Michail Noltsis, Nikolaos Zambelis

, Francky Catthoor, Dimitrios Soudris
:
A Closed-Loop Controller to Ensure Performance and Temperature Constraints for Dynamic Applications. 40:1-40:24 - Guy Durrieu, Claire Pagetti

:
GRec: Automatic Computation of Reconfiguration Graphs for Multi-core Platforms. 41:1-41:24 - Siwen Zhu, Yi Tang, Junxiang Zheng, Yongzhi Cao

, Hanpin Wang, Yu Huang, Marian Margraf:
Sample Essentiality and Its Application to Modeling Attacks on Arbiter PUFs. 42:1-42:25 - Manuel Strobel

, Martin Radetzki:
Power-mode-aware Memory Subsystem Optimization for Low-power System-on-Chip Design. 43:1-43:25 - Mohammad Motamedi

, Felix Portillo, Daniel D. Fong
, Soheil Ghiasi:
Distill-Net: Application-Specific Distillation of Deep Convolutional Neural Networks for Resource-Constrained IoT Platforms. 44:1-44:20 - Quan Zhou, Guohui Li, Jianjun Li, Chenggang Deng, Ling Yuan:

Response Time Analysis for Tasks with Fixed Preemption Points under Global Scheduling. 111:1-111:23
Volume 18, Number 5s, October 2019
- Jiecao Yu, Andrew Lukefahr, Reetuparna Das

, Scott A. Mahlke:
TF-Net: Deploying Sub-Byte Deep Neural Networks on Microcontrollers. 45:1-45:21 - Larissa Rozales Gonçalves, Rafael Fão de Moura, Luigi Carro:

Aggressive Energy Reduction for Video Inference with Software-only Strategies. 46:1-46:20 - Jeff Jun Zhang, Parul Raj, Shuayb Zarar, Amol Ambardekar, Siddharth Garg:

CompAct: On-chip <underline>Com</underline>pression of <underline>Act</underline>ivations for Low Power Systolic Array Based CNN Acceleration. 47:1-47:24 - Jorge Castro-Godínez

, Muhammad Shafique
, Jörg Henkel:
ECAx: Balancing Error Correction Costs in Approximate Accelerators. 48:1-48:20 - Ganapati Bhat, Yigit Tuncel

, Sizhe An
, Hyung Gyu Lee, Ümit Y. Ogras
:
An Ultra-Low Energy Human Activity Recognition Accelerator for Wearable Health Applications. 49:1-49:22 - Dhananjaya Wijerathne, Zhaoying Li, Manupa Karunarathne, Anuj Pathania, Tulika Mitra

:
CASCADE: High Throughput Data Streaming via Decoupled Access-Execute CGRA. 50:1-50:26 - Francesco Restuccia

, Marco Pagani
, Alessandro Biondi
, Mauro Marinoni
, Giorgio C. Buttazzo:
Is Your Bus Arbiter Really Fair? Restoring Fairness in AXI Interconnects for FPGA SoCs. 51:1-51:22 - Sumit K. Mandal

, Raid Ayoub, Michael Kishinevsky, Ümit Y. Ogras
:
Analytical Performance Models for NoCs with Multiple Priority Traffic Classes. 52:1-52:21 - Shihao Song, Anup Das

, Onur Mutlu
, Nagarajan Kandasamy:
Enabling and Exploiting Partition-Level Parallelism (PALP) in Phase Change Memories. 53:1-53:25 - Aditya Sridhar, Mohamed Ibrahim, Krishnendu Chakrabarty

:
Synterface: Efficient Chip-to-World Interfacing for Flow-Based Microfluidic Biochips Using Pin-Count Minimization. 54:1-54:21 - Minsu Kim

, Jeong-Keun Park, Sungyeol Kim, Insu Yang, Hyunsoo Jung, Soo-Mook Moon:
Output-based Intermediate Representation for Translation of Test-pattern Program. 55:1-55:22 - Lucas Bragança da Silva, Ricardo S. Ferreira, Michael Canesche, Marcelo M. Menezes, Maria D. Vieira, Jeronimo Costa Penha

, Peter Jamieson, José Augusto Miranda Nacif:
READY: A Fine-Grained Multithreading Overlay Framework for Modern CPU-FPGA Dataflow Applications. 56:1-56:20 - Sunghyun Park, Youfeng Wu, Janghaeng Lee, Amir Aupov

, Scott A. Mahlke:
Multi-objective Exploration for Practical Optimization Decisions in Binary Translation. 57:1-57:19 - Marco Dürr

, Georg von der Brüggen
, Kuan-Hsun Chen
, Jian-Jia Chen
:
End-to-End Timing Analysis of Sporadic Cause-Effect Chains in Distributed Systems. 58:1-58:24 - Marcos T. Leipnitz

, Gabriel L. Nazar:
High-Level Synthesis of Approximate Designs under Real-Time Constraints. 59:1-59:21 - Samah Mohamed Saeed, Robert Wille, Ramesh Karri

:
Locking the Design of Building Blocks for Quantum Circuits. 60:1-60:15
- Ram Prasad Mohanty

, Hasindu Gamaarachchi
, Andrew J. Lambert
, Sri Parameswaran
:
SWARAM: Portable Energy and Cost Efficient Embedded System for Genomic Processing. 61:1-61:24 - Jihye Kim

, Jiwon Lee, Hankyung Ko, Donghwan Oh
, Semin Han
, Gwonho Jeong, Hyunok Oh:
AuthCropper: Authenticated Image Cropper for Privacy Preserving Surveillance Systems. 62:1-62:17 - Daniel D. Fong

, Vivek J. Srinivasan, Kourosh Vali, Soheil Ghiasi:
Optode Design Space Exploration for Clinically-robust Non-invasive Fetal Oximetry. 63:1-63:22 - Lokesh Siddhu

, Preeti Ranjan Panda:
PredictNcool: Leakage Aware Thermal Management for 3D Memories Using a Lightweight Temperature Predictor. 64:1-64:22 - Chenlin Ma, Zhaoyan Shen, Lei Han, Zili Shao:

RMW-F: A Design of RMW-Free Cache Using Built-in NAND-Flash for SMR Storage. 65:1-65:18 - Yu-Pei Liang, Tseng-Yi Chen

, Yuan-Hao Chang
, Shuo-Han Chen
, Kam-yiu Lam, Wei-Hsin Li, Wei-Kuan Shih:
Enabling Sequential-write-constrained B+-tree Index Scheme to Upgrade Shingled Magnetic Recording Storage Performance. 66:1-66:20 - Weiwen Jiang, Edwin H.-M. Sha, Xinyi Zhang, Lei Yang, Qingfeng Zhuge, Yiyu Shi, Jingtong Hu:

Achieving Super-Linear Speedup across Multi-FPGA for Real-Time DNN Inference. 67:1-67:23 - Wei-Chen Wang

, Yuan-Hao Chang
, Tei-Wei Kuo
, Chien-Chung Ho
, Yu-Ming Chang, Hung-Sheng Chang:
Achieving Lossless Accuracy with Lossy Programming for Efficient Neural-Network Training on NVM-Based Systems. 68:1-68:22 - Zhengguo Chen

, Quan Deng
, Nong Xiao, Kirk Pruhs, Youtao Zhang:
DWMAcc: Accelerating Shift-based CNNs with Domain Wall Memories. 69:1-69:19 - Shail Dave

, Youngbin Kim
, Sasikanth Avancha, Kyoungwoo Lee, Aviral Shrivastava
:
dMazeRunner: Executing Perfectly Nested Loops on Dataflow Accelerators. 70:1-70:27 - Stefano Spellini

, Michele Lora
, Franco Fummi
, Sudipta Chattopadhyay
:
Compositional Design of Multi-Robot Systems Control Software on ROS. 71:1-71:24 - Hashan Roshantha Mendis, Pi-Cheng Hsiu

:
Accumulative Display Updating for Intermittent Systems. 72:1-72:22 - Biruk B. Seyoum

, Alessandro Biondi
, Giorgio C. Buttazzo:
FLORA: FLoorplan Optimizer for Reconfigurable Areas in FPGAs. 73:1-73:20 - Kasra Moazzemi, Biswadip Maity, Saehanseul Yi

, Amir M. Rahmani
, Nikil D. Dutt
:
HESSLE-FREE: <u>He</u>terogeneou<u>s</u> <u>S</u>ystems <u>Le</u>veraging <u>F</u>uzzy Control for <u>R</u>untim<u>e</u> Resourc<u>e</u> Management. 74:1-74:19 - Abhishek Vashist, Andrew Keats, Sai Manoj Pudukotai Dinakarrao

, Amlan Ganguly:
Unified Testing and Security Framework for Wireless Network-on-Chip Enabled Multi-Core Chips. 75:1-75:20 - Alexy Torres Aurora Dugo, Jean-Baptiste Lefoul, Felipe Gohring de Magalhaes, Dahman Assal, Gabriela Nicolescu:

Cache Locking Content Selection Algorithms for ARINC-653 Compliant RTOS. 76:1-76:20 - Aryan Deshwal, Nitthilan Kannappan Jayakodi, Biresh Kumar Joardar, Janardhan Rao Doppa, Partha Pratim Pande:

MOOS: A Multi-Objective Design Space Exploration and Optimization Framework for NoC Enabled Manycore Systems. 77:1-77:23 - Fedor Smirnov, Behnaz Pourmohseni

, Michael Glaß
, Jürgen Teich
:
IGOR, Get Me the Optimum! Prioritizing Important Design Decisions During the DSE of Embedded Systems. 78:1-78:22 - Zhongqi Cheng, Rainer Dömer:

Analyzing Variable Entanglement for Parallel Simulation of SystemC TLM-2.0 Models. 79:1-79:20 - Minjun Seo, Fadi J. Kurdahi

:
Efficient Tracing Methodology Using Automata Processor. 80:1-80:18 - Hadi Brais, Preeti Ranjan Panda:

Alleria: An Advanced Memory Access Profiling Framework. 81:1-81:22 - Kartikeya Bhardwaj, Chingyi Lin, Anderson L. Sartor, Radu Marculescu:

Memory- and Communication-Aware Model Compression for Distributed Deep Learning Inference on IoT. 82:1-82:22 - Kamyar Mirzazad Barijough, Zhuoran Zhao, Andreas Gerstlauer:

Quality/Latency-Aware Real-time Scheduling of Distributed Streaming IoT Applications. 83:1-83:23
- Youchao Wang, Sam Willis, Vasileios Tsoutsouras, Phillip Stanley-Marbell:

Deriving Equations from Sensor Data Using Dimensional Function Synthesis. 84:1-84:22 - Xiaotian Dai

, Wanli Chang, Shuai Zhao, Alan Burns:
A Dual-Mode Strategy for Performance-Maximisation and Resource-Efficient CPS Design. 85:1-85:20 - Roberto Passerone, Íñigo Íncer Romeo

, Alberto L. Sangiovanni-Vincentelli:
Coherent Extension, Composition, and Merging Operators in Contract Models for System Design. 86:1-86:23 - Omar I. Al-Bataineh, David S. Rosenblum, Mark Reynolds

:
Efficient Decentralized LTL Monitoring Framework Using Tableau Technique. 87:1-87:21 - Jan Baumeister, Bernd Finkbeiner, Maximilian Schwenger, Hazem Torfah

:
FPGA Stream-Monitoring of Real-time Properties. 88:1-88:24 - Levente Bajczi

, András Vörös, Vince Molnár
:
Will My Program Break on This Faulty Processor?: Formal Analysis of Hardware Fault Activations in Concurrent Embedded Software. 89:1-89:21 - Youngmoon Lee

, Kang G. Shin, Hoon Sung Chwa
:
Thermal-Aware Scheduling for Integrated CPUs-GPU Platforms. 90:1-90:25 - Peng Chen, Weichen Liu

, Xu Jiang, Qingqiang He, Nan Guan
:
Timing-Anomaly Free Dynamic Scheduling of Conditional DAG Tasks on Multi-Core Systems. 91:1-91:19 - Yu Wang

, Mojtaba Zarei, Borzoo Bonakdarpour, Miroslav Pajic
:
Statistical Verification of Hyperproperties for Cyber-Physical Systems. 92:1-92:23 - Zhengxiong Luo

, Feilong Zuo, Yu Jiang, Jian Gao, Xun Jiao, Jiaguang Sun:
Polar: Function Code Aware Fuzz Testing of ICS Protocol. 93:1-93:22 - Youcheng Sun

, Xiaowei Huang, Daniel Kroening
, James Sharp
, Matthew Hill, Rob Ashmore:
Structural Test Coverage Criteria for Deep Neural Networks. 94:1-94:23 - Yi-Ting Lin

, Hsiang Hsu, Shang-Chien Lin, Chung-Wei Lin, Iris Hui-Ru Jiang, Changliu Liu:
Graph-Based Modeling, Scheduling, and Verification for Intersection Management of Intelligent Vehicles. 95:1-95:21 - Panagiotis Kyriakis, Jyotirmoy V. Deshmukh, Paul Bogdan:

Specification Mining and Robust Design under Uncertainty: A Stochastic Temporal Logic Approach. 96:1-96:21 - Bineet Ghosh, Parasara Sridhar Duggirala:

Robust Reachable Set: Accounting for Uncertainties in Linear Dynamical Systems. 97:1-97:22 - Ratan Lal

, Pavithra Prabhakar:
Counterexample Guided Abstraction Refinement for Polyhedral Probabilistic Hybrid Systems. 98:1-98:23 - Parasara Sridhar Duggirala, Stanley Bak:

Aggregation Strategies in Reachable Set Computation of Hybrid Systems. 99:1-99:21 - Mahmoud Salamati, Rocco Salvia, Eva Darulova

, Sadegh Soudjani, Rupak Majumdar:
Memory-Efficient Mixed-Precision Implementations for Robust Explicit Model Predictive Control. 100:1-100:19 - Florian Arrestier, Karol Desnos, Eduardo Juárez

, Daniel Ménard:
Numerical Representation of Directed Acyclic Graphs for Efficient Dataflow Embedded Resource Allocation. 101:1-101:22 - Andreas Ziegler

, Julian Geus, Bernhard Heinloth, Timo Hönig, Daniel Lohmann
:
Honey, I Shrunk the ELFs: Lightweight Binary Tailoring of Shared Libraries. 102:1-102:23 - Runyu Pan, Gabriel Parmer:

MxU: Towards Predictable, Flexible, and Efficient Memory Access Control for the Secure IoT. 103:1-103:20 - Keun Soo Yim

, Iliyan Malchev, Andrew Hsieh, Dave Burke:
Treble: Fast Software Updates by Creating an Equilibrium in an Active Software Ecosystem of Globally Distributed Stakeholders. 104:1-104:23 - Hoang-Dung Tran, Feiyang Cai, Diego Manzanas Lopez, Patrick Musau, Taylor T. Johnson

, Xenofon D. Koutsoukos:
Safety Verification of Cyber-Physical Systems with Reinforcement Learning Control. 105:1-105:22 - Chao Huang, Jiameng Fan, Wenchao Li

, Xin Chen, Qi Zhu:
ReachNN: Reachability Analysis of Neural-Network Controlled Systems. 106:1-106:22 - Shakiba Yaghoubi, Georgios Fainekos

:
Worst-case Satisfaction of STL Specifications Using Feedforward Neural Network Controllers: A Lagrange Multipliers Approach. 107:1-107:20 - Dominic Oehlert

, Selma Saidi
, Heiko Falk
:
Code-Inherent Traffic Shaping for Hard Real-Time Systems. 108:1-108:21 - Muhammad Ali Awan

, Konstantinos Bletsas
, Pedro F. Souto
, Benny Akesson, Eduardo Tovar
:
Techniques and Analysis for Mixed-criticality Scheduling with Mode-dependent Server Execution Budgets. 109:1-109:23 - Joost van Pinxten, Marc Geilen

, Twan Basten:
Parametric Scheduler Characterization. 110:1-110:25
Volume 18, Number 6, January 2020
- Sandeep K. Shukla:

Editorial: Embedded Computing and Society. 112:1-112:3 - Shubham Jain

, Anand Raghunathan
:
CxDNN: Hardware-software Compensation Methods for Deep Neural Networks on Resistive Crossbar Systems. 113:1-113:23 - Saideep Tiku

, Sudeep Pasricha:
Overcoming Security Vulnerabilities in Deep Learning-based Indoor Localization Frameworks on Mobile Devices. 114:1-114:24 - Sakshi Tiwari

, Shreshth Tuli, Isaar Ahmad
, Ayushi Agarwal
, Preeti Ranjan Panda, Sreenivas Subramoney
:
REAL: REquest Arbitration in Last Level Caches. 115:1-115:24 - Surinder Sood

, Avinash Malik, Partha S. Roop:
Robust Design and Validation of Cyber-physical Systems. 116:1-116:21 - Jia Zhou

, Prachi Joshi, Haibo Zeng, Renfa Li:
BTMonitor: Bit-time-based Intrusion Detection and Attacker Identification in Controller Area Network. 117:1-117:23 - Mengquan Li

, Weichen Liu
, Nan Guan
, Yiyuan Xie, Yaoyao Ye:
Hardware-Software Collaborative Thermal Sensing in Optical Network-on-Chip-based Manycore Systems. 118:1-118:24 - Katayoun Neshatpour, Houman Homayoun, Avesta Sasan:

ICNN: The Iterative Convolutional Neural Network. 119:1-119:27 - Gustav Cedersjö

, Jörn W. Janneck:
Tÿcho: A Framework for Compiling Stream Programs. 120:1-120:25 - Zain Alabedin Haj Hammadeh

, Sophie Quinton, Rolf Ernst:
Weakly-hard Real-time Guarantees for Earliest Deadline First Scheduling of Independent Tasks. 121:1-121:25 - Gnanambikai Krishnakumar

, Kommuru Alekhya Reddy, Chester Rebeiro:
ALEXIA: A Processor with Lightweight Extensions for Memory Safety. 122:1-122:27 - Kaige Yan, Jingweijia Tan, Longjun Liu

, Xingyao Zhang
, Stanko R. Brankovic, Jinghong Chen, Xin Fu:
Toward Customized Hybrid Fuel-Cell and Battery-powered Mobile Device for Individual Users. 123:1-123:20

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














