callback( { "result":{ "query":":facetid:toc:\"db/conf/iolts/iolts2018.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"68.34" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"64", "@dc":"64", "@oc":"64", "@id":"43407770", "text":":facetid:toc:db/conf/iolts/iolts2018.bht" } }, "hits":{ "@total":"64", "@computed":"64", "@sent":"64", "@first":"0", "hit":[{ "@score":"1", "@id":"2615585", "info":{"authors":{"author":[{"@pid":"116/7566","text":"Esteve Amat"},{"@pid":"21/4866","text":"Ramon Canal"},{"@pid":"55/6767","text":"Antonio Rubio 0001"}]},"title":"Modem Gain-Cell Memories in Advanced Technologies.","venue":"IOLTS","pages":"65-68","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/AmatCR18","doi":"10.1109/IOLTS.2018.8474151","ee":"https://doi.org/10.1109/IOLTS.2018.8474151","url":"https://dblp.org/rec/conf/iolts/AmatCR18"}, "url":"URL#2615585" }, { "@score":"1", "@id":"2615586", "info":{"authors":{"author":[{"@pid":"145/9380","text":"Martin Andraud"},{"@pid":"92/3233","text":"Marian Verhelst"}]},"title":"From on-chip self-healing to self-adaptivity in analog/RF ICs: challenges and opportunities.","venue":"IOLTS","pages":"131-134","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/AndraudV18","doi":"10.1109/IOLTS.2018.8474078","ee":"https://doi.org/10.1109/IOLTS.2018.8474078","url":"https://dblp.org/rec/conf/iolts/AndraudV18"}, "url":"URL#2615586" }, { "@score":"1", "@id":"2615587", "info":{"authors":{"author":[{"@pid":"181/6812","text":"Ayman A. Atallah"},{"@pid":"60/10783","text":"Ghaith Bany Hamad"},{"@pid":"95/4076","text":"Otmane Aït Mohamed"}]},"title":"Fault-Resilient Topology Planning and Traffic Configuration for IEEE 802.1Qbv TSN Networks.","venue":"IOLTS","pages":"151-156","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/AtallahHM18","doi":"10.1109/IOLTS.2018.8474201","ee":"https://doi.org/10.1109/IOLTS.2018.8474201","url":"https://dblp.org/rec/conf/iolts/AtallahHM18"}, "url":"URL#2615587" }, { "@score":"1", "@id":"2615588", "info":{"authors":{"author":[{"@pid":"216/2018","text":"Hossein Bardareh"},{"@pid":"227/4622","text":"Amir M. Hajisadeghi"},{"@pid":"54/2774","text":"Hamid R. Zarandi"}]},"title":"A Low-Cost Soft Error Tolerant Read Circuit for Single/Multi-Level Cross-Point RRAM Arrays.","venue":"IOLTS","pages":"39-40","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/BardarehHZ18","doi":"10.1109/IOLTS.2018.8474076","ee":"https://doi.org/10.1109/IOLTS.2018.8474076","url":"https://dblp.org/rec/conf/iolts/BardarehHZ18"}, "url":"URL#2615588" }, { "@score":"1", "@id":"2615589", "info":{"authors":{"author":[{"@pid":"173/8994","text":"Amir R. B. Behrouzian"},{"@pid":"70/1380","text":"Dip Goswami"},{"@pid":"b/TwanBasten","text":"Twan Basten"}]},"title":"Robust co-synthesis of embedded control systems with occasional deadline misses.","venue":"IOLTS","pages":"127-130","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/BehrouzianGB18","doi":"10.1109/IOLTS.2018.8474138","ee":"https://doi.org/10.1109/IOLTS.2018.8474138","url":"https://dblp.org/rec/conf/iolts/BehrouzianGB18"}, "url":"URL#2615589" }, { "@score":"1", "@id":"2615590", "info":{"authors":{"author":[{"@pid":"135/0026","text":"Arkady Bramnik"},{"@pid":"38/1130","text":"Yiannakis Sazeides"}]},"title":"To Detect or to Correct?","venue":"IOLTS","pages":"35-38","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/BramnikS18","doi":"10.1109/IOLTS.2018.8474073","ee":"https://doi.org/10.1109/IOLTS.2018.8474073","url":"https://dblp.org/rec/conf/iolts/BramnikS18"}, "url":"URL#2615590" }, { "@score":"1", "@id":"2615591", "info":{"authors":{"author":[{"@pid":"40/11247","text":"Florian Cacho"},{"@pid":"207/1472","text":"D. Nouguier"},{"@pid":"177/9749","text":"M. Arabi"},{"@pid":"98/6695","text":"X. Federspiel"},{"@pid":"227/4291","text":"Y. Carminati"},{"@pid":"161/0196","text":"M. Saliva"}]},"title":"Integrated Test Structures for Reliability Investigation under Dynamic Stimuli.","venue":"IOLTS","pages":"1-5","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/CachoNAFCS18","doi":"10.1109/IOLTS.2018.8474074","ee":"https://doi.org/10.1109/IOLTS.2018.8474074","url":"https://dblp.org/rec/conf/iolts/CachoNAFCS18"}, "url":"URL#2615591" }, { "@score":"1", "@id":"2615592", "info":{"authors":{"author":[{"@pid":"195/4188","text":"Xuebing Cao"},{"@pid":"69/4675","text":"Liyi Xiao"},{"@pid":"227/4863","text":"Linzhe Li"},{"@pid":"17/2703-30","text":"Jie Li 0030"},{"@pid":"36/3755","text":"Jiaqiang Li"},{"@pid":"30/2133-1","text":"Jinxiang Wang 0001"}]},"title":"Soft error optimization of combinational circuit based on gate sizing and multi-objective particle swarm optimization algorithm.","venue":"IOLTS","pages":"165-170","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/CaoXLLLW18","doi":"10.1109/IOLTS.2018.8474275","ee":"https://doi.org/10.1109/IOLTS.2018.8474275","url":"https://dblp.org/rec/conf/iolts/CaoXLLLW18"}, "url":"URL#2615592" }, { "@score":"1", "@id":"2615593", "info":{"authors":{"author":[{"@pid":"169/5054","text":"Sara Carbonara"},{"@pid":"216/3285","text":"Andrea Firrincieli"},{"@pid":"r/MatteoSonzaReorda","text":"Matteo Sonza Reorda"},{"@pid":"187/9225","text":"Jan-Gerd Mess"}]},"title":"On the test of a COTS-based system for space applications.","venue":"IOLTS","pages":"47-48","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/CarbonaraFRM18","doi":"10.1109/IOLTS.2018.8474085","ee":"https://doi.org/10.1109/IOLTS.2018.8474085","url":"https://dblp.org/rec/conf/iolts/CarbonaraFRM18"}, "url":"URL#2615593" }, { "@score":"1", "@id":"2615594", "info":{"authors":{"author":[{"@pid":"210/5554","text":"Alberto Carelli"},{"@pid":"150/6751","text":"Alessandro Vallero"},{"@pid":"78/1169","text":"Stefano Di Carlo"}]},"title":"Shielding Performance Monitor Counters: a double edged weapon for safety and security.","venue":"IOLTS","pages":"269-274","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/CarelliVC18","doi":"10.1109/IOLTS.2018.8474191","ee":"https://doi.org/10.1109/IOLTS.2018.8474191","url":"https://dblp.org/rec/conf/iolts/CarelliVC18"}, "url":"URL#2615594" }, { "@score":"1", "@id":"2615595", "info":{"authors":{"author":[{"@pid":"170/3249","text":"Athanasios Chatzidimitriou"},{"@pid":"54/2215-1","text":"George Papadimitriou 0001"},{"@pid":"79/1691","text":"Dimitris Gizopoulos"}]},"title":"HealthLog Monitor: A Flexible System-Monitoring Linux Service.","venue":"IOLTS","pages":"183-188","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/Chatzidimitriou18","doi":"10.1109/IOLTS.2018.8474119","ee":"https://doi.org/10.1109/IOLTS.2018.8474119","url":"https://dblp.org/rec/conf/iolts/Chatzidimitriou18"}, "url":"URL#2615595" }, { "@score":"1", "@id":"2615596", "info":{"authors":{"author":[{"@pid":"120/3228","text":"Ameya Chaudhari"},{"@pid":"a/JacobAAbraham","text":"Jacob A. Abraham"}]},"title":"Effective Control Flow Integrity Checks for Intrusion Detection.","venue":"IOLTS","pages":"103-108","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/ChaudhariA18","doi":"10.1109/IOLTS.2018.8474130","ee":"https://doi.org/10.1109/IOLTS.2018.8474130","url":"https://dblp.org/rec/conf/iolts/ChaudhariA18"}, "url":"URL#2615596" }, { "@score":"1", "@id":"2615597", "info":{"authors":{"author":[{"@pid":"225/4884","text":"Javier Diaz-Fortuny"},{"@pid":"62/4169","text":"Javier Martín-Martínez"},{"@pid":"121/3724","text":"Rosana Rodríguez"},{"@pid":"12/766","text":"Montserrat Nafría"},{"@pid":"12/1677","text":"Rafael Castro-López"},{"@pid":"65/100","text":"Elisenda Roca"},{"@pid":"f/FVFFernandez","text":"Francisco V. Fernández 0001"}]},"title":"CMOS Characterization and Compact Modelling for Circuit Reliability Simulation.","venue":"IOLTS","pages":"139-142","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/Diaz-FortunyMRN18","doi":"10.1109/IOLTS.2018.8474244","ee":"https://doi.org/10.1109/IOLTS.2018.8474244","url":"https://dblp.org/rec/conf/iolts/Diaz-FortunyMRN18"}, "url":"URL#2615597" }, { "@score":"1", "@id":"2615598", "info":{"authors":{"author":[{"@pid":"149/9928","text":"Helen-Maria Dounavi"},{"@pid":"72/7126","text":"Yiorgos Sfikas"},{"@pid":"t/YiorgosTsiatouhas","text":"Yiorgos Tsiatouhas"}]},"title":"Periodic Aging Monitoring in SRAM Sense Amplifiers.","venue":"IOLTS","pages":"12-16","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/DounaviST18","doi":"10.1109/IOLTS.2018.8474169","ee":"https://doi.org/10.1109/IOLTS.2018.8474169","url":"https://dblp.org/rec/conf/iolts/DounaviST18"}, "url":"URL#2615598" }, { "@score":"1", "@id":"2615599", "info":{"authors":{"author":[{"@pid":"80/609","text":"Boyang Du"},{"@pid":"227/4980","text":"Josie E. Rodriguez Condia"},{"@pid":"r/MatteoSonzaReorda","text":"Matteo Sonza Reorda"},{"@pid":"66/3508","text":"Luca Sterpone"}]},"title":"About the functional test of the GPGPU scheduler.","venue":"IOLTS","pages":"85-90","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/DuCRS18","doi":"10.1109/IOLTS.2018.8474174","ee":"https://doi.org/10.1109/IOLTS.2018.8474174","url":"https://dblp.org/rec/conf/iolts/DuCRS18"}, "url":"URL#2615599" }, { "@score":"1", "@id":"2615600", "info":{"authors":{"author":[{"@pid":"91/7973","text":"Jean-Max Dutertre"},{"@pid":"51/5772","text":"Vincent Beroulle"},{"@pid":"40/8518","text":"Philippe Candelier"},{"@pid":"227/4577","text":"Louis-Barthelemy Faber"},{"@pid":"23/6156","text":"Marie-Lise Flottes"},{"@pid":"60/663","text":"Philippe Gendrier"},{"@pid":"41/6112","text":"David Hély"},{"@pid":"05/2696","text":"Régis Leveugle"},{"@pid":"02/6402","text":"Paolo Maistri"},{"@pid":"71/5847","text":"Giorgio Di Natale"},{"@pid":"144/4625","text":"Athanasios Papadimitriou"},{"@pid":"75/1130","text":"Bruno Rouzeyre"}]},"title":"The case of using CMOS FD-SOI rather than CMOS bulk to harden ICs against laser attacks.","venue":"IOLTS","pages":"214-219","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/DutertreBCFFGHL18","doi":"10.1109/IOLTS.2018.8474230","ee":"https://doi.org/10.1109/IOLTS.2018.8474230","url":"https://dblp.org/rec/conf/iolts/DutertreBCFFGHL18"}, "url":"URL#2615600" }, { "@score":"1", "@id":"2615601", "info":{"authors":{"author":[{"@pid":"167/5177","text":"Stefano Esposito"},{"@pid":"167/5095","text":"Serhiy Avramenko"},{"@pid":"45/3891","text":"Massimo Violante"}]},"title":"Efficient Software-Based Partitioning for Commercial-off-the-Shelf NoC-based MPSoCs for Mixed-Criticality Systems.","venue":"IOLTS","pages":"189-194","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/EspositoAV18","doi":"10.1109/IOLTS.2018.8474155","ee":"https://doi.org/10.1109/IOLTS.2018.8474155","url":"https://dblp.org/rec/conf/iolts/EspositoAV18"}, "url":"URL#2615601" }, { "@score":"1", "@id":"2615602", "info":{"authors":{"author":[{"@pid":"167/5177","text":"Stefano Esposito"},{"@pid":"218/3081","text":"Jacopo Sini"},{"@pid":"45/3891","text":"Massimo Violante"}]},"title":"Real-Time Validation of Fault-Tolerant Mixed-Criticality Systems.","venue":"IOLTS","pages":"245-246","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/EspositoSV18","doi":"10.1109/IOLTS.2018.8474091","ee":"https://doi.org/10.1109/IOLTS.2018.8474091","url":"https://dblp.org/rec/conf/iolts/EspositoSV18"}, "url":"URL#2615602" }, { "@score":"1", "@id":"2615603", "info":{"authors":{"author":[{"@pid":"227/4419","text":"Renato S. Feitoza"},{"@pid":"83/3865","text":"Manuel J. Barragán"},{"@pid":"78/6168","text":"Salvador Mir"},{"@pid":"137/5424","text":"Daniel Dzahini"}]},"title":"Reduced-code static linearity test of SAR ADCs using a built-in incremental ∑Δ converter.","venue":"IOLTS","pages":"29-34","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/FeitozaBMD18","doi":"10.1109/IOLTS.2018.8474180","ee":"https://doi.org/10.1109/IOLTS.2018.8474180","url":"https://dblp.org/rec/conf/iolts/FeitozaBMD18"}, "url":"URL#2615603" }, { "@score":"1", "@id":"2615604", "info":{"authors":{"author":[{"@pid":"236/3340","text":"Andrea Floridia"},{"@pid":"s/ErnestoSanchez","text":"Ernesto Sánchez 0001"},{"@pid":"39/6614","text":"Nikolaos Andrikos"}]},"title":"Development flow of on-line Software Test Libraries for asynchronous processor cores.","venue":"IOLTS","pages":"73-78","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/FloridiaSA18","doi":"10.1109/IOLTS.2018.8474126","ee":"https://doi.org/10.1109/IOLTS.2018.8474126","url":"https://dblp.org/rec/conf/iolts/FloridiaSA18"}, "url":"URL#2615604" }, { "@score":"1", "@id":"2615605", "info":{"authors":{"author":[{"@pid":"160/1657","text":"Anteneh Gebregiorgis"},{"@pid":"55/3589","text":"Mehdi Baradaran Tahoori"}]},"title":"Reliability And Performance Challenges Of Ultra-Low Voltage Caches: A Trade-Off Analysis.","venue":"IOLTS","pages":"265-268","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/GebregiorgisT18","doi":"10.1109/IOLTS.2018.8474272","ee":"https://doi.org/10.1109/IOLTS.2018.8474272","url":"https://dblp.org/rec/conf/iolts/GebregiorgisT18"}, "url":"URL#2615605" }, { "@score":"1", "@id":"2615606", "info":{"authors":{"author":[{"@pid":"137/1388","text":"Panagiotis Georgiou"},{"@pid":"88/6762","text":"Xrysovalantis Kavousianos"},{"@pid":"153/0024","text":"Riccardo Cantoro"},{"@pid":"r/MatteoSonzaReorda","text":"Matteo Sonza Reorda"}]},"title":"Fault-Independent Test-Generation for Software-Based Self-Testing.","venue":"IOLTS","pages":"79-84","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/GeorgiouKCR18","doi":"10.1109/IOLTS.2018.8474081","ee":"https://doi.org/10.1109/IOLTS.2018.8474081","url":"https://dblp.org/rec/conf/iolts/GeorgiouKCR18"}, "url":"URL#2615606" }, { "@score":"1", "@id":"2615607", "info":{"authors":{"author":[{"@pid":"164/8807-2","text":"Jorge Gomez 0002"},{"@pid":"70/5337","text":"Angel Abusleme"},{"@pid":"118/9065","text":"Ioannis Vourkas"},{"@pid":"55/6767","text":"Antonio Rubio 0001"}]},"title":"Resistive Switching Behavior seen from the Energy Point of View.","venue":"IOLTS","pages":"147-150","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/GomezAVR18","doi":"10.1109/IOLTS.2018.8474167","ee":"https://doi.org/10.1109/IOLTS.2018.8474167","url":"https://dblp.org/rec/conf/iolts/GomezAVR18"}, "url":"URL#2615607" }, { "@score":"1", "@id":"2615608", "info":{"authors":{"author":[{"@pid":"227/5031","text":"Valentin Guiterrez"},{"@pid":"11/803","text":"Antonio J. Ginés"},{"@pid":"16/4945","text":"Gildas Léger"}]},"title":"AMS-RF test quality: Assessing defect severity.","venue":"IOLTS","pages":"23-28","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/GuiterrezGL18","doi":"10.1109/IOLTS.2018.8474109","ee":"https://doi.org/10.1109/IOLTS.2018.8474109","url":"https://dblp.org/rec/conf/iolts/GuiterrezGL18"}, "url":"URL#2615608" }, { "@score":"1", "@id":"2615609", "info":{"authors":{"author":[{"@pid":"191/2451","text":"Muhammad Abdullah Hanif"},{"@pid":"145/5424","text":"Faiq Khalid"},{"@pid":"54/10157","text":"Rachmad Vidya Wicaksana Putra"},{"@pid":"39/10300","text":"Semeen Rehman"},{"@pid":"s/MuhammadShafique","text":"Muhammad Shafique 0001"}]},"title":"Robust Machine Learning Systems: Reliability and Security for Deep Neural Networks.","venue":"IOLTS","pages":"257-260","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/HanifKPR018","doi":"10.1109/IOLTS.2018.8474192","ee":"https://doi.org/10.1109/IOLTS.2018.8474192","url":"https://dblp.org/rec/conf/iolts/HanifKPR018"}, "url":"URL#2615609" }, { "@score":"1", "@id":"2615610", "info":{"authors":{"author":[{"@pid":"187/9210","text":"Kento Hasegawa"},{"@pid":"77/3396","text":"Masao Yanagisawa"},{"@pid":"94/1497","text":"Nozomu Togawa"}]},"title":"Detecting the Existence of Malfunctions in Microcontrollers Utilizing Power Analysis.","venue":"IOLTS","pages":"97-102","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/HasegawaYT18","doi":"10.1109/IOLTS.2018.8474113","ee":"https://doi.org/10.1109/IOLTS.2018.8474113","url":"https://dblp.org/rec/conf/iolts/HasegawaYT18"}, "url":"URL#2615610" }, { "@score":"1", "@id":"2615611", "info":{"authors":{"author":[{"@pid":"184/5380","text":"Theodor Hillebrand"},{"@pid":"57/349","text":"Steffen Paul"},{"@pid":"129/7553","text":"Dagmar Peters-Drolshagen"}]},"title":"A New Approach to Threshold Voltage Measurements of Transistors.","venue":"IOLTS","pages":"207-213","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/HillebrandPP18","doi":"10.1109/IOLTS.2018.8474086","ee":"https://doi.org/10.1109/IOLTS.2018.8474086","url":"https://dblp.org/rec/conf/iolts/HillebrandPP18"}, "url":"URL#2615611" }, { "@score":"1", "@id":"2615612", "info":{"authors":{"author":[{"@pid":"45/839","text":"Toshinori Hosokawa"},{"@pid":"227/4782","text":"Morito Niseki"},{"@pid":"66/3154","text":"Masayoshi Yoshimura"},{"@pid":"63/4073","text":"Hiroshi Yamazaki"},{"@pid":"72/6791","text":"Masayuki Arai"},{"@pid":"00/2646","text":"Hiroyuki Yotsuyanagi"},{"@pid":"09/5520","text":"Masaki Hashizume"}]},"title":"A Sequentially Untestable Fault Identification Method Based on n-Bit State Cube Justification.","venue":"IOLTS","pages":"43-46","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/HosokawaNYYAYH18","doi":"10.1109/IOLTS.2018.8474268","ee":"https://doi.org/10.1109/IOLTS.2018.8474268","url":"https://dblp.org/rec/conf/iolts/HosokawaNYYAYH18"}, "url":"URL#2615612" }, { "@score":"1", "@id":"2615613", "info":{"authors":{"author":[{"@pid":"45/839","text":"Toshinori Hosokawa"},{"@pid":"63/4073","text":"Hiroshi Yamazaki"},{"@pid":"206/2333","text":"Shun Takeda"},{"@pid":"66/3154","text":"Masayoshi Yoshimura"}]},"title":"A Test Register Assignment Method Based on Controller Augmentation to Reduce the Number of Test Patterns.","venue":"IOLTS","pages":"228-231","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/HosokawaYTY18","doi":"10.1109/IOLTS.2018.8474097","ee":"https://doi.org/10.1109/IOLTS.2018.8474097","url":"https://dblp.org/rec/conf/iolts/HosokawaYTY18"}, "url":"URL#2615613" }, { "@score":"1", "@id":"2615614", "info":{"authors":{"author":[{"@pid":"168/6296","text":"Ryota Ishikawa"},{"@pid":"130/9918","text":"Masashi Tawada"},{"@pid":"77/3396","text":"Masao Yanagisawa"},{"@pid":"94/1497","text":"Nozomu Togawa"}]},"title":"An Effective Stochastic Number Duplicator and Its Evaluations Using Composite Arithmetic Circuits.","venue":"IOLTS","pages":"53-56","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/IshikawaTYT18","doi":"10.1109/IOLTS.2018.8474263","ee":"https://doi.org/10.1109/IOLTS.2018.8474263","url":"https://dblp.org/rec/conf/iolts/IshikawaTYT18"}, "url":"URL#2615614" }, { "@score":"1", "@id":"2615615", "info":{"authors":{"author":[{"@pid":"67/471","text":"Naghmeh Karimi"},{"@pid":"52/4689","text":"Jean-Luc Danger"},{"@pid":"86/2396","text":"Sylvain Guilley"}]},"title":"On the Effect of Aging in Detecting Hardware Trojan Horses with Template Analysis.","venue":"IOLTS","pages":"281-286","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/KarimiDG18","doi":"10.1109/IOLTS.2018.8474089","ee":"https://doi.org/10.1109/IOLTS.2018.8474089","url":"https://dblp.org/rec/conf/iolts/KarimiDG18"}, "url":"URL#2615615" }, { "@score":"1", "@id":"2615616", "info":{"authors":{"author":[{"@pid":"227/4672","text":"Mounia Kharbouche-Harrari"},{"@pid":"97/8552","text":"Jérémy Postel-Pellerin"},{"@pid":"61/3518","text":"Gregory di Pendina"},{"@pid":"61/11031","text":"Romain Wacquez"},{"@pid":"124/8509","text":"Driss Aboulkassimi"},{"@pid":"00/10856","text":"Marc Bocquet"},{"@pid":"227/4641","text":"R. Sousa"},{"@pid":"227/5052","text":"R. Delattre"},{"@pid":"08/4890","text":"Jean-Michel Portal"}]},"title":"Impact of a Laser Pulse on a STT-MRAM Bitcell: Security and Reliability Issues.","venue":"IOLTS","pages":"243-244","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/Kharbouche-Harrari18","doi":"10.1109/IOLTS.2018.8474088","ee":"https://doi.org/10.1109/IOLTS.2018.8474088","url":"https://dblp.org/rec/conf/iolts/Kharbouche-Harrari18"}, "url":"URL#2615616" }, { "@score":"1", "@id":"2615617", "info":{"authors":{"author":[{"@pid":"48/11070","text":"Somayeh Sadeghi Kohan"},{"@pid":"227/4393","text":"Arash Vafaei"},{"@pid":"29/2510","text":"Zainalabedin Navabi"}]},"title":"Near-Optimal Node Selection Procedure for Aging Monitor Placement.","venue":"IOLTS","pages":"6-11","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/KohanVN18","doi":"10.1109/IOLTS.2018.8474120","ee":"https://doi.org/10.1109/IOLTS.2018.8474120","url":"https://dblp.org/rec/conf/iolts/KohanVN18"}, "url":"URL#2615617" }, { "@score":"1", "@id":"2615618", "info":{"authors":{"author":[{"@pid":"33/1954","text":"Milos Krstic"},{"@pid":"18/11199","text":"Aleksandar Simevski"},{"@pid":"82/11198-2","text":"Markus Ulbricht 0002"},{"@pid":"131/9614","text":"Stefan Weidling"}]},"title":"Power/Area-Optimized Fault Tolerance for Safety Critical Applications.","venue":"IOLTS","pages":"123-126","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/KrsticSUW18","doi":"10.1109/IOLTS.2018.8474178","ee":"https://doi.org/10.1109/IOLTS.2018.8474178","url":"https://dblp.org/rec/conf/iolts/KrsticSUW18"}, "url":"URL#2615618" }, { "@score":"1", "@id":"2615619", "info":{"authors":{"author":[{"@pid":"163/9389","text":"Alexandra Listl"},{"@pid":"96/8188","text":"Daniel Mueller-Gritschneder"},{"@pid":"227/4525","text":"Fabian Kluge"},{"@pid":"07/6841","text":"Ulf Schlichtmann"}]},"title":"Emulation of an ASIC Power, Temperature and Aging Monitor System for FPGA Prototyping.","venue":"IOLTS","pages":"220-225","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/ListlMKS18","doi":"10.1109/IOLTS.2018.8474284","ee":"https://doi.org/10.1109/IOLTS.2018.8474284","url":"https://dblp.org/rec/conf/iolts/ListlMKS18"}, "url":"URL#2615619" }, { "@score":"1", "@id":"2615620", "info":{"authors":{"author":[{"@pid":"62/3614","text":"Shyue-Kung Lu"},{"@pid":"22/11157","text":"Hui-Ping Li"},{"@pid":"25/3675","text":"Kohei Miyase"}]},"title":"Adaptive ECC Techniques for Reliability and Yield Enhancement of Phase Change Memory.","venue":"IOLTS","pages":"226-227","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/LuLM18","doi":"10.1109/IOLTS.2018.8474118","ee":"https://doi.org/10.1109/IOLTS.2018.8474118","url":"https://dblp.org/rec/conf/iolts/LuLM18"}, "url":"URL#2615620" }, { "@score":"1", "@id":"2615621", "info":{"authors":{"author":[{"@pid":"227/4292","text":"Shakil Mahmud"},{"@pid":"116/3353","text":"Steve J. A. Majerus"},{"@pid":"116/3518","text":"Margot S. Damaser"},{"@pid":"144/4472","text":"Robert Karam"}]},"title":"Design Tradeoffs in Bioimplantable Devices: A Case Study with Bladder Pressure Monitoring.","venue":"IOLTS","pages":"69-72","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/MahmudMDK18","doi":"10.1109/IOLTS.2018.8474106","ee":"https://doi.org/10.1109/IOLTS.2018.8474106","url":"https://dblp.org/rec/conf/iolts/MahmudMDK18"}, "url":"URL#2615621" }, { "@score":"1", "@id":"2615622", "info":{"authors":{"author":[{"@pid":"145/9519","text":"Petra R. Maier"},{"@pid":"166/7764","text":"Uzair Sharif"},{"@pid":"96/8188","text":"Daniel Mueller-Gritschneder"},{"@pid":"07/6841","text":"Ulf Schlichtmann"}]},"title":"Efficient Fault Injection for Embedded Systems: As Fast as Possible but as Accurate as Necessary.","venue":"IOLTS","pages":"119-122","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/MaierSMS18","doi":"10.1109/IOLTS.2018.8474079","ee":"https://doi.org/10.1109/IOLTS.2018.8474079","url":"https://dblp.org/rec/conf/iolts/MaierSMS18"}, "url":"URL#2615622" }, { "@score":"1", "@id":"2615623", "info":{"authors":{"author":[{"@pid":"154/0073","text":"Honorio Martín"},{"@pid":"e/LuisEntrena","text":"Luis Entrena"},{"@pid":"24/4466","text":"Sophie Dupuis"},{"@pid":"71/5847","text":"Giorgio Di Natale"}]},"title":"A Novel Use of Approximate Circuits to Thwart Hardware Trojan Insertion and Provide Obfuscation.","venue":"IOLTS","pages":"41-42","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/MartinEDN18","doi":"10.1109/IOLTS.2018.8474077","ee":"https://doi.org/10.1109/IOLTS.2018.8474077","url":"https://dblp.org/rec/conf/iolts/MartinEDN18"}, "url":"URL#2615623" }, { "@score":"1", "@id":"2615624", "info":{"authors":{"author":[{"@pid":"12/2988","text":"Anzhela Yu. Matrosova"},{"@pid":"90/156","text":"Sergei Ostanin"},{"@pid":"227/4620","text":"Semen Chernyshov"}]},"title":"Finding False Paths for Sequential Circuits Using Operations on ROBDDs.","venue":"IOLTS","pages":"240-242","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/MatrosovaOC18","doi":"10.1109/IOLTS.2018.8474213","ee":"https://doi.org/10.1109/IOLTS.2018.8474213","url":"https://dblp.org/rec/conf/iolts/MatrosovaOC18"}, "url":"URL#2615624" }, { "@score":"1", "@id":"2615625", "info":{"authors":{"author":[{"@pid":"167/5130","text":"Md Imran Momtaz"},{"@pid":"60/9443","text":"Suvadeep Banerjee"},{"@pid":"187/9291","text":"Sujay Pandey"},{"@pid":"a/JacobAAbraham","text":"Jacob A. Abraham"},{"@pid":"31/928","text":"Abhijit Chatterjee"}]},"title":"Cross-Layer Control Adaptation for Autonomous System Resilience.","venue":"IOLTS","pages":"261-264","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/MomtazBPAC18","doi":"10.1109/IOLTS.2018.8474159","ee":"https://doi.org/10.1109/IOLTS.2018.8474159","url":"https://dblp.org/rec/conf/iolts/MomtazBPAC18"}, "url":"URL#2615625" }, { "@score":"1", "@id":"2615626", "info":{"authors":{"author":[{"@pid":"135/5385","text":"Lev Mukhanov"},{"@pid":"200/8449","text":"Konstantinos Tovletoglou"},{"@pid":"50/1235","text":"Dimitrios S. Nikolopoulos"},{"@pid":"34/2281","text":"Georgios Karakonstantis"}]},"title":"DRAM Characterization under Relaxed Refresh Period Considering System Level Effects within a Commodity Server.","venue":"IOLTS","pages":"236-239","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/MukhanovTNK18","doi":"10.1109/IOLTS.2018.8474184","ee":"https://doi.org/10.1109/IOLTS.2018.8474184","url":"https://dblp.org/rec/conf/iolts/MukhanovTNK18"}, "url":"URL#2615626" }, { "@score":"1", "@id":"2615627", "info":{"authors":{"author":{"@pid":"48/5272","text":"Ondrej Novák"}},"title":"Test Compression Using Extended Nonlinear Binary Codes.","venue":"IOLTS","pages":"255-256","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/Novak18","doi":"10.1109/IOLTS.2018.8474242","ee":"https://doi.org/10.1109/IOLTS.2018.8474242","url":"https://dblp.org/rec/conf/iolts/Novak18"}, "url":"URL#2615627" }, { "@score":"1", "@id":"2615628", "info":{"authors":{"author":[{"@pid":"227/4520","text":"Sayuri Ochi"},{"@pid":"63/4073","text":"Hiroshi Yamazaki"},{"@pid":"45/839","text":"Toshinori Hosokawa"},{"@pid":"66/3154","text":"Masayoshi Yoshimura"}]},"title":"A Capture Safe Static Test Compaction Method Based on Don't Cares.","venue":"IOLTS","pages":"195-200","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/OchiYHY18","doi":"10.1109/IOLTS.2018.8474080","ee":"https://doi.org/10.1109/IOLTS.2018.8474080","url":"https://dblp.org/rec/conf/iolts/OchiYHY18"}, "url":"URL#2615628" }, { "@score":"1", "@id":"2615629", "info":{"authors":{"author":[{"@pid":"227/4244","text":"Yosuke Okamura"},{"@pid":"29/4628","text":"Tohru Ishihara"},{"@pid":"37/1497","text":"Hidetoshi Onodera"}]},"title":"Independent N-Well And P-Well Biasing For Minimum Leakage Energy Operation.","venue":"IOLTS","pages":"177-182","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/OkamuraIO18","doi":"10.1109/IOLTS.2018.8474128","ee":"https://doi.org/10.1109/IOLTS.2018.8474128","url":"https://dblp.org/rec/conf/iolts/OkamuraIO18"}, "url":"URL#2615629" }, { "@score":"1", "@id":"2615630", "info":{"authors":{"author":[{"@pid":"187/9291","text":"Sujay Pandey"},{"@pid":"60/9443","text":"Suvadeep Banerjee"},{"@pid":"31/928","text":"Abhijit Chatterjee"}]},"title":"Error Resilient Neuromorphic Networks Using Checker Neurons.","venue":"IOLTS","pages":"135-138","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/PandeyBC18","doi":"10.1109/IOLTS.2018.8474075","ee":"https://doi.org/10.1109/IOLTS.2018.8474075","url":"https://dblp.org/rec/conf/iolts/PandeyBC18"}, "url":"URL#2615630" }, { "@score":"1", "@id":"2615631", "info":{"authors":{"author":[{"@pid":"132/4010","text":"Martin Perner"},{"@pid":"57/3614-1","text":"Ulrich Schmid 0001"}]},"title":"Self-Stabilizing High-Speed Communication in Multi-Synchronous GALS Architectures.","venue":"IOLTS","pages":"157-164","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/Perner018","doi":"10.1109/IOLTS.2018.8474221","ee":"https://doi.org/10.1109/IOLTS.2018.8474221","url":"https://dblp.org/rec/conf/iolts/Perner018"}, "url":"URL#2615631" }, { "@score":"1", "@id":"2615632", "info":{"authors":{"author":[{"@pid":"188/6683","text":"Pascal Raiola"},{"@pid":"08/6743","text":"Michael A. Kochte"},{"@pid":"222/5350","text":"Ahmed Atteya"},{"@pid":"144/4523","text":"Laura Rodríguez Gómez"},{"@pid":"02/1297","text":"Hans-Joachim Wunderlich"},{"@pid":"b/BerndBecker","text":"Bernd Becker 0001"},{"@pid":"74/1145-2","text":"Matthias Sauer 0002"}]},"title":"Detecting and Resolving Security Violations in Reconfigurable Scan Networks.","venue":"IOLTS","pages":"91-96","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/RaiolaKAGW0018","doi":"10.1109/IOLTS.2018.8474188","ee":"https://doi.org/10.1109/IOLTS.2018.8474188","url":"https://dblp.org/rec/conf/iolts/RaiolaKAGW0018"}, "url":"URL#2615632" }, { "@score":"1", "@id":"2615633", "info":{"authors":{"author":[{"@pid":"39/10300","text":"Semeen Rehman"},{"@pid":"41/10300","text":"Florian Kriebel"},{"@pid":"199/8771","text":"Bharath Srinivas Prabakaran"},{"@pid":"145/5424","text":"Faiq Khalid"},{"@pid":"s/MuhammadShafique","text":"Muhammad Shafique 0001"}]},"title":"Hardware and Software Techniques for Heterogeneous Fault-Tolerance.","venue":"IOLTS","pages":"115-118","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/RehmanKPK018","doi":"10.1109/IOLTS.2018.8474219","ee":"https://doi.org/10.1109/IOLTS.2018.8474219","url":"https://dblp.org/rec/conf/iolts/RehmanKPK018"}, "url":"URL#2615633" }, { "@score":"1", "@id":"2615634", "info":{"authors":{"author":[{"@pid":"180/6930","text":"Gennaro Severino Rodrigues"},{"@pid":"l/FGdLimaKastensmidt","text":"Fernanda Lima Kastensmidt"},{"@pid":"67/1524","text":"Vincent Pouget"},{"@pid":"62/1403","text":"Alberto Bosio"}]},"title":"Performances VS Reliability: how to exploit Approximate Computing for Safety-Critical applications.","venue":"IOLTS","pages":"291-294","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/RodriguesKPB18","doi":"10.1109/IOLTS.2018.8474122","ee":"https://doi.org/10.1109/IOLTS.2018.8474122","url":"https://dblp.org/rec/conf/iolts/RodriguesKPB18"}, "url":"URL#2615634" }, { "@score":"1", "@id":"2615635", "info":{"authors":{"author":[{"@pid":"177/7186","text":"Shervin Roshanisefat"},{"@pid":"220/3195","text":"Harshith K. Thirumala"},{"@pid":"02/1286","text":"Kris Gaj"},{"@pid":"63/3012","text":"Houman Homayoun"},{"@pid":"83/7356","text":"Avesta Sasan"}]},"title":"Benchmarking the Capabilities and Limitations of SAT Solvers in Defeating Obfuscation Schemes.","venue":"IOLTS","pages":"275-280","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/RoshanisefatTGH18","doi":"10.1109/IOLTS.2018.8474189","ee":"https://doi.org/10.1109/IOLTS.2018.8474189","url":"https://dblp.org/rec/conf/iolts/RoshanisefatTGH18"}, "url":"URL#2615635" }, { "@score":"1", "@id":"2615636", "info":{"authors":{"author":[{"@pid":"154/2994","text":"Victor M. van Santen"},{"@pid":"94/10663","text":"Hussam Amrouch"},{"@pid":"h/JorgHenkel","text":"Jörg Henkel"}]},"title":"Reliability Estimations of Large Circuits in Massively-Parallel GPU-SPICE.","venue":"IOLTS","pages":"143-146","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/SantenAH18","doi":"10.1109/IOLTS.2018.8474096","ee":"https://doi.org/10.1109/IOLTS.2018.8474096","url":"https://dblp.org/rec/conf/iolts/SantenAH18"}, "url":"URL#2615636" }, { "@score":"1", "@id":"2615637", "info":{"authors":{"author":[{"@pid":"03/2422-3","text":"Robert Schmidt 0003"},{"@pid":"205/2214","text":"Rehab Massoud"},{"@pid":"55/6283","text":"Jaan Raik"},{"@pid":"80/3384","text":"Alberto García Ortiz"},{"@pid":"d/RolfDrechsler","text":"Rolf Drechsler"}]},"title":"Reliability Improvements for Multiprocessor Systems by Health-Aware Task Scheduling.","venue":"IOLTS","pages":"247-250","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/SchmidtMROD18","doi":"10.1109/IOLTS.2018.8474101","ee":"https://doi.org/10.1109/IOLTS.2018.8474101","url":"https://dblp.org/rec/conf/iolts/SchmidtMROD18"}, "url":"URL#2615637" }, { "@score":"1", "@id":"2615638", "info":{"authors":{"author":[{"@pid":"218/3081","text":"Jacopo Sini"},{"@pid":"r/MatteoSonzaReorda","text":"Matteo Sonza Reorda"},{"@pid":"45/3891","text":"Massimo Violante"},{"@pid":"140/0436","text":"Peter Sarson"}]},"title":"Towards an automatic approach for hardware verification according to ISO 26262 functional safety standard.","venue":"IOLTS","pages":"287-290","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/SiniRVS18","doi":"10.1109/IOLTS.2018.8474083","ee":"https://doi.org/10.1109/IOLTS.2018.8474083","url":"https://dblp.org/rec/conf/iolts/SiniRVS18"}, "url":"URL#2615638" }, { "@score":"1", "@id":"2615639", "info":{"authors":{"author":[{"@pid":"218/3081","text":"Jacopo Sini"},{"@pid":"45/3891","text":"Massimo Violante"}]},"title":"An Automatic Approach to Perform FMEDA Safety Assessment on Hardware Designs.","venue":"IOLTS","pages":"49-52","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/SiniV18","doi":"10.1109/IOLTS.2018.8474217","ee":"https://doi.org/10.1109/IOLTS.2018.8474217","url":"https://dblp.org/rec/conf/iolts/SiniV18"}, "url":"URL#2615639" }, { "@score":"1", "@id":"2615640", "info":{"authors":{"author":[{"@pid":"174/2608","text":"Farah Naz Taher"},{"@pid":"45/10267","text":"Mostafa Kishani"},{"@pid":"92/3091","text":"Benjamin Carrión Schäfer"}]},"title":"Design and Optimization of Reliable Hardware Accelerators: Leveraging the Advantages of High-Level Synthesis.","venue":"IOLTS","pages":"232-235","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/TaherKS18","doi":"10.1109/IOLTS.2018.8474222","ee":"https://doi.org/10.1109/IOLTS.2018.8474222","url":"https://dblp.org/rec/conf/iolts/TaherKS18"}, "url":"URL#2615640" }, { "@score":"1", "@id":"2615641", "info":{"authors":{"author":[{"@pid":"187/9222","text":"Ghislain Takam Tchendjou"},{"@pid":"36/3035","text":"Emmanuel Simeu"}]},"title":"Self-Healing Imager Based on Detection and Conciliation of Defective Pixels.","venue":"IOLTS","pages":"251-254","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/TchendjouS18","doi":"10.1109/IOLTS.2018.8474149","ee":"https://doi.org/10.1109/IOLTS.2018.8474149","url":"https://dblp.org/rec/conf/iolts/TchendjouS18"}, "url":"URL#2615641" }, { "@score":"1", "@id":"2615642", "info":{"authors":{"author":[{"@pid":"20/2144","text":"Vasileios Tenentes"},{"@pid":"r/DanieleRossi","text":"Daniele Rossi 0001"},{"@pid":"48/5139","text":"Bashir M. Al-Hashimi"}]},"title":"Collective-Aware System-on-Chips for Dependable IoT Applications.","venue":"IOLTS","pages":"57-60","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/Tenentes0A18","doi":"10.1109/IOLTS.2018.8474172","ee":"https://doi.org/10.1109/IOLTS.2018.8474172","url":"https://dblp.org/rec/conf/iolts/Tenentes0A18"}, "url":"URL#2615642" }, { "@score":"1", "@id":"2615643", "info":{"authors":{"author":[{"@pid":"227/4568","text":"Ninghan Tian"},{"@pid":"44/5557","text":"Daniel G. Saab"},{"@pid":"a/JacobAAbraham","text":"Jacob A. Abraham"}]},"title":"ESIFT: Efficient System for Error Injection.","venue":"IOLTS","pages":"201-206","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/TianSA18","doi":"10.1109/IOLTS.2018.8474160","ee":"https://doi.org/10.1109/IOLTS.2018.8474160","url":"https://dblp.org/rec/conf/iolts/TianSA18"}, "url":"URL#2615643" }, { "@score":"1", "@id":"2615644", "info":{"authors":{"author":[{"@pid":"191/6866","text":"Marcello Traiola"},{"@pid":"73/7684","text":"Alessandro Savino"},{"@pid":"134/1019","text":"Mario Barbareschi"},{"@pid":"78/1169","text":"Stefano Di Carlo"},{"@pid":"62/1403","text":"Alberto Bosio"}]},"title":"Predicting the Impact of Functional Approximation: from Component- to Application-Level.","venue":"IOLTS","pages":"61-64","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/TraiolaSBCB18","doi":"10.1109/IOLTS.2018.8474072","ee":"https://doi.org/10.1109/IOLTS.2018.8474072","url":"https://dblp.org/rec/conf/iolts/TraiolaSBCB18"}, "url":"URL#2615644" }, { "@score":"1", "@id":"2615645", "info":{"authors":{"author":[{"@pid":"223/9664","text":"Ioannis Tsiokanos"},{"@pid":"135/5385","text":"Lev Mukhanov"},{"@pid":"50/1235","text":"Dimitrios S. Nikolopoulos"},{"@pid":"34/2281","text":"Georgios Karakonstantis"}]},"title":"Minimization of Timing Failures in Pipelined Designs via Path Shaping and Operand Truncation.","venue":"IOLTS","pages":"171-176","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/TsiokanosMNK18","doi":"10.1109/IOLTS.2018.8474084","ee":"https://doi.org/10.1109/IOLTS.2018.8474084","url":"https://dblp.org/rec/conf/iolts/TsiokanosMNK18"}, "url":"URL#2615645" }, { "@score":"1", "@id":"2615646", "info":{"authors":{"author":[{"@pid":"93/8337","text":"Elena Ioana Vatajelu"},{"@pid":"12/10348","text":"Lorena Anghel"},{"@pid":"08/4890","text":"Jean-Michel Portal"},{"@pid":"00/10856","text":"Marc Bocquet"},{"@pid":"27/6348","text":"Guillaume Prenat"}]},"title":"Resistive and Spintronic RAMs: Device, Simulation, and Applications.","venue":"IOLTS","pages":"109-114","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/VatajeluAPBP18","doi":"10.1109/IOLTS.2018.8474226","ee":"https://doi.org/10.1109/IOLTS.2018.8474226","url":"https://dblp.org/rec/conf/iolts/VatajeluAPBP18"}, "url":"URL#2615646" }, { "@score":"1", "@id":"2615647", "info":{"authors":{"author":[{"@pid":"227/4859","text":"T. Vayssade"},{"@pid":"49/2745","text":"Florence Azaïs"},{"@pid":"77/668","text":"Laurent Latorre"},{"@pid":"159/1256","text":"Francois Lefevre"}]},"title":"Low-cost functional test of a 2.4 GHz OQPSK transmitter using standard digital ATE.","venue":"IOLTS","pages":"17-22","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/iolts/VayssadeALL18","doi":"10.1109/IOLTS.2018.8474229","ee":"https://doi.org/10.1109/IOLTS.2018.8474229","url":"https://dblp.org/rec/conf/iolts/VayssadeALL18"}, "url":"URL#2615647" }, { "@score":"1", "@id":"2685591", "info":{"authors":{"author":[{"@pid":"79/1691","text":"Dimitris Gizopoulos"},{"@pid":"36/4660","text":"Dan Alexandrescu"},{"@pid":"56/1494","text":"Mihalis Maniatakos"},{"@pid":"116/7560","text":"Panagiota Papavramidou"}]},"title":"24th IEEE International Symposium on On-Line Testing And Robust System Design, IOLTS 2018, Platja D'Aro, Spain, July 2-4, 2018","venue":"IOLTS","publisher":"IEEE","year":"2018","type":"Editorship","key":"conf/iolts/2018","ee":"https://ieeexplore.ieee.org/xpl/conhome/8450543/proceeding","url":"https://dblp.org/rec/conf/iolts/2018"}, "url":"URL#2685591" } ] } } } )