default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 679 matches
- 2024
- Soyed Tuhin Ahmed, Mahta Mayahinia, Michael Hefenbrock, Christopher Münch, Mehdi B. Tahoori:
Design-time Reference Current Generation for Robust Spintronic-based Neuromorphic Architecture. ACM J. Emerg. Technol. Comput. Syst. 20(1): 2:1-2:20 (2024) - Morteza Amouzegar, Morteza Rezaalipour, Masoud Dehyadegari:
Genetic Cache: A Machine Learning Approach to Designing DRAM Cache Controllers in HBM Systems. ACM J. Emerg. Technol. Comput. Syst. 20(3): 11:1-11:24 (2024) - Benjamin Bean, Cyrus Minwalla, Eirini-Eleni Tsiropoulou, Jim Plusquellic:
PUF-based Digital Money with Propagation-of-Provenance and Offline Transfers between Two Parties. ACM J. Emerg. Technol. Comput. Syst. 20(3): 9:1-9:26 (2024) - Patricia Gonzalez-Guerrero, Kylie Huch, Nirmalendu Patra, Doru-Thom Popovici, George Michelogiannakis:
Toward Practical Superconducting Accelerators for Machine Learning Using U-SFQ. ACM J. Emerg. Technol. Comput. Syst. 20(2): 7:1-7:22 (2024) - Venkata Sai Praneeth Karempudi, Janibul Bashir, Ishan G. Thakkar:
An Analysis of Various Design Pathways Towards Multi-Terabit Photonic On-Interposer Interconnects. ACM J. Emerg. Technol. Comput. Syst. 20(2): 6:1-6:34 (2024) - Abhoy Kole, Kamalika Datta, Indranil Sengupta, Rolf Drechsler:
Exploiting the Extended Neighborhood of Hexagonal Qubit Architecture for Mapping Quantum Circuits. ACM J. Emerg. Technol. Comput. Syst. 20(4): 13:1-13:19 (2024) - Ziwen Li, Yu Ma, Jindong Zhou, Pingqiang Zhou:
Spiking-NeRF: Spiking Neural Network for Energy-Efficient Neural Rendering. ACM J. Emerg. Technol. Comput. Syst. 20(3): 10:1-10:23 (2024) - Fabiha Nowshin, Hongyu An, Yang Yi:
Towards Energy-Efficient Spiking Neural Networks: A Robust Hybrid CMOS-Memristive Accelerator. ACM J. Emerg. Technol. Comput. Syst. 20(1): 5:1-5:20 (2024) - Ikenna Okafor, Akshay Krishna Ramanathan, Nagadastagiri Challapalle, Zheyu Li, Vijaykrishnan Narayanan:
Fusing In-storage and Near-storage Acceleration of Convolutional Neural Networks. ACM J. Emerg. Technol. Comput. Syst. 20(1): 1:1-1:22 (2024) - Yiming Ouyang, Shuaijie Yuan, Jianhua Li, Huaguo Liang:
F-Bypass: A Low-Power Network-on-Chip Design Utilizing Bypass to Improve Network Connectivity. ACM J. Emerg. Technol. Comput. Syst. 20(4): 14:1-14:26 (2024) - Mariam Rakka, Walaa Amer, Hanning Chen, Mohsen Imani, Fadi J. Kurdahi:
HDRLPIM: A Simulator for Hyper-Dimensional Reinforcement Learning Based on Processing In-Memory. ACM J. Emerg. Technol. Comput. Syst. 20(4): 15:1-15:17 (2024) - Sourav Roy, Dipnarayan Das, Bibhash Sen:
Secure and Lightweight Authentication Protocol Using PUF for the IoT-based Wireless Sensor Network. ACM J. Emerg. Technol. Comput. Syst. 20(1): 3:1-3:17 (2024) - Omais Shafi, Mohammad Khalid Pandit, Amarjeet Saini, Gayathri Ananthanarayanan, Rijurekha Sen:
Repercussions of Using DNN Compilers on Edge GPUs for Real Time and Safety Critical Systems: A Quantitative Audit. ACM J. Emerg. Technol. Comput. Syst. 20(1): 4:1-4:25 (2024) - Cristian Tirelli, Juan Sapriza, Rubén Rodríguez Álvarez, Lorenzo Ferretti, Benoît W. Denkinger, Giovanni Ansaloni, Jose Angel Miranda, David Atienza, Laura Pozzi:
SAT-Based Exact Modulo Scheduling Mapping for Resource-Constrained CGRAs. ACM J. Emerg. Technol. Comput. Syst. 20(3): 8:1-8:26 (2024) - Hansika Weerasena, Prabhat Mishra:
Breaking On-Chip Communication Anonymity Using Flow Correlation Attacks. ACM J. Emerg. Technol. Comput. Syst. 20(4): 12:1-12:27 (2024) - 2023
- Usman Ali, Sheikh Abdul Rasheed Sahni, Omer Khan:
Characterization of Timing-based Software Side-channel Attacks and Mitigations on Network-on-Chip Hardware. ACM J. Emerg. Technol. Comput. Syst. 19(3): 21:1-21:23 (2023) - Yuri Ardesi, Umberto Garlando, Fabrizio Riente, Giuliana Beretta, Gianluca Piccinini, Mariagrazia Graziano:
Taming Molecular Field-Coupling for Nanocomputing Design. ACM J. Emerg. Technol. Comput. Syst. 19(1): 1:1-1:24 (2023) - Bryan Bartley, Jacob Beal, Miles Rogers, Daniel Bryce, Robert P. Goldman, Benjamin Keller, Peter Lee, Vanessa Biggers, Joshua Nowak, Mark Weston:
Building an Open Representation for Biological Protocols. ACM J. Emerg. Technol. Comput. Syst. 19(3): 28:1-28:21 (2023) - Sachin Bhat, Mingyu Li, Sourabh Kulkarni, Csaba Andras Moritz:
SkyBridge 2.0: A Fine-grained Vertical 3D-IC Technology for Future ICs. ACM J. Emerg. Technol. Comput. Syst. 19(4): 33:1-33:19 (2023) - Alvaro Cintas Canto, Mehran Mozaffari Kermani, Reza Azarderakhsh:
Reliable Constructions for the Key Generator of Code-based Post-quantum Cryptosystems on FPGA. ACM J. Emerg. Technol. Comput. Syst. 19(1): 5:1-5:20 (2023) - Xiangru Chen, Maneesh Merugu, Jiaqi Zhang, Sandip Ray:
AroMa: Evaluating Deep Learning Systems for Stealthy Integrity Attacks on Multi-tenant Accelerators. ACM J. Emerg. Technol. Comput. Syst. 19(2): 13:1-13:17 (2023) - Cansu Demirkiran, Furkan Eris, Gongyu Wang, Jonathan Elmhurst, Nick Moore, Nicholas C. Harris, Ayon Basumallik, Vijay Janapa Reddi, Ajay Joshi, Darius Bunandar:
An Electro-Photonic System for Accelerating Deep Neural Networks. ACM J. Emerg. Technol. Comput. Syst. 19(4): 30:1-30:31 (2023) - Douglas Densmore, Nathan J. Hillson, Eric Klavins, Chris J. Myers, Jean Peccoud, Giovanni Stracquadanio:
Introduction to the Special Issue on BioFoundries and Cloud Laboratories. ACM J. Emerg. Technol. Comput. Syst. 19(3): 26:1-26:2 (2023) - Ferhat Erata, Shuwen Deng, Faisal Zaghloul, Wenjie Xiong, Onur Demir, Jakub Szefer:
Survey of Approaches and Techniques for Security Verification of Computer Systems. ACM J. Emerg. Technol. Comput. Syst. 19(1): 6:1-6:34 (2023) - Farimah Farahmandi, Ankur Srivastava, Giorgio Di Natale, Mark M. Tehranipoor:
Introduction to the Special Issue on CAD for Security: Pre-silicon Security Sign-off Solutions Through Design Cycle. ACM J. Emerg. Technol. Comput. Syst. 19(1): 4:1-4:4 (2023) - Freddy Forero, Víctor H. Champac, Michel Renovell:
B-open Defect: A Novel Defect Model in FinFET Technology. ACM J. Emerg. Technol. Comput. Syst. 19(1): 3:1-3:19 (2023) - Pravin Gaikwad, Jonathan Cruz, Prabuddha Chakraborty, Swarup Bhunia, Tamzidul Hoque:
Hardware IP Assurance against Trojan Attacks with Machine Learning and Post-processing. ACM J. Emerg. Technol. Comput. Syst. 19(3): 25:1-25:23 (2023) - Amlan Ganguly, Salvatore Monteleone, Diana Goehringer, Cristinel Ababei:
Guest Editors Introduction: Special Issue on Network-on-Chip Architectures of the Future (NoCArc). ACM J. Emerg. Technol. Comput. Syst. 19(3): 19:1-19:3 (2023) - Md Mahfuz Al Hasan, Mohammad Tahsin Mostafiz, Thomas An Le, Jake Julia, Nidish Vashistha, Shayan Taheri, Navid Asadizanjani:
EVHA: Explainable Vision System for Hardware Testing and Assurance - An Overview. ACM J. Emerg. Technol. Comput. Syst. 19(3): 24:1-24:25 (2023) - Siyuan Huang, Brian D. Hoskins, Matthew W. Daniels, Mark D. Stiles, Gina C. Adam:
Low-Rank Gradient Descent for Memory-Efficient Training of Deep In-Memory Arrays. ACM J. Emerg. Technol. Comput. Syst. 19(2): 16:1-16:24 (2023)
skipping 649 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-01-21 02:18 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint