default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 126 matches
- 2020
- Gustav Cedersjö, Jörn W. Janneck:
Tÿcho: A Framework for Compiling Stream Programs. ACM Trans. Embed. Comput. Syst. 18(6): 120:1-120:25 (2020) - Zain Alabedin Haj Hammadeh, Sophie Quinton, Rolf Ernst:
Weakly-hard Real-time Guarantees for Earliest Deadline First Scheduling of Independent Tasks. ACM Trans. Embed. Comput. Syst. 18(6): 121:1-121:25 (2020) - Shubham Jain, Anand Raghunathan:
CxDNN: Hardware-software Compensation Methods for Deep Neural Networks on Resistive Crossbar Systems. ACM Trans. Embed. Comput. Syst. 18(6): 113:1-113:23 (2020) - Gnanambikai Krishnakumar, Kommuru Alekhya Reddy, Chester Rebeiro:
ALEXIA: A Processor with Lightweight Extensions for Memory Safety. ACM Trans. Embed. Comput. Syst. 18(6): 122:1-122:27 (2020) - Mengquan Li, Weichen Liu, Nan Guan, Yiyuan Xie, Yaoyao Ye:
Hardware-Software Collaborative Thermal Sensing in Optical Network-on-Chip-based Manycore Systems. ACM Trans. Embed. Comput. Syst. 18(6): 118:1-118:24 (2020) - Katayoun Neshatpour, Houman Homayoun, Avesta Sasan:
ICNN: The Iterative Convolutional Neural Network. ACM Trans. Embed. Comput. Syst. 18(6): 119:1-119:27 (2020) - Sandeep K. Shukla:
Editorial: Embedded Computing and Society. ACM Trans. Embed. Comput. Syst. 18(6): 112:1-112:3 (2020) - Surinder Sood, Avinash Malik, Partha S. Roop:
Robust Design and Validation of Cyber-physical Systems. ACM Trans. Embed. Comput. Syst. 18(6): 116:1-116:21 (2020) - Saideep Tiku, Sudeep Pasricha:
Overcoming Security Vulnerabilities in Deep Learning-based Indoor Localization Frameworks on Mobile Devices. ACM Trans. Embed. Comput. Syst. 18(6): 114:1-114:24 (2020) - Sakshi Tiwari, Shreshth Tuli, Isaar Ahmad, Ayushi Agarwal, Preeti Ranjan Panda, Sreenivas Subramoney:
REAL: REquest Arbitration in Last Level Caches. ACM Trans. Embed. Comput. Syst. 18(6): 115:1-115:24 (2020) - Kaige Yan, Jingweijia Tan, Longjun Liu, Xingyao Zhang, Stanko R. Brankovic, Jinghong Chen, Xin Fu:
Toward Customized Hybrid Fuel-Cell and Battery-powered Mobile Device for Individual Users. ACM Trans. Embed. Comput. Syst. 18(6): 123:1-123:20 (2020) - Jia Zhou, Prachi Joshi, Haibo Zeng, Renfa Li:
BTMonitor: Bit-time-based Intrusion Detection and Attacker Identification in Controller Area Network. ACM Trans. Embed. Comput. Syst. 18(6): 117:1-117:23 (2020) - 2019
- Andreas Ziegler, Julian Geus, Bernhard Heinloth, Timo Hönig, Daniel Lohmann:
Honey, I Shrunk the ELFs: Lightweight Binary Tailoring of Shared Libraries. ACM Trans. Embed. Comput. Syst. 18(5s): 102:1-102:23 (2019) - Yu Wang, Mojtaba Zarei, Borzoo Bonakdarpour, Miroslav Pajic:
Statistical Verification of Hyperproperties for Cyber-Physical Systems. ACM Trans. Embed. Comput. Syst. 18(5s): 92:1-92:23 (2019) - Rehan Ahmed, Bernhard Buchli, Stefan Draskovic, Lukas Sigrist, Pratyush Kumar, Lothar Thiele:
Optimal Power Management with Guaranteed Minimum Energy Utilization for Solar Energy Harvesting Systems. ACM Trans. Embed. Comput. Syst. 18(4): 30:1-30:26 (2019) - Alif Ahmed, Yuanwen Huang, Prabhat Mishra:
Cache Reconfiguration Using Machine Learning for Vulnerability-aware Energy Optimization. ACM Trans. Embed. Comput. Syst. 18(2): 15:1-15:24 (2019) - Omar I. Al-Bataineh, David S. Rosenblum, Mark Reynolds:
Efficient Decentralized LTL Monitoring Framework Using Tableau Technique. ACM Trans. Embed. Comput. Syst. 18(5s): 87:1-87:21 (2019) - Zaid Al-bayati, Youcheng Sun, Haibo Zeng, Marco Di Natale, Qi Zhu, Brett H. Meyer:
Partitioning and Selection of Data Consistency Mechanisms for Multicore Real-Time Systems. ACM Trans. Embed. Comput. Syst. 18(4): 35:1-35:28 (2019) - G. G. Md. Nawaz Ali, Md. Noor-A-Rahim, Md. Ashiqur Rahman, Beshah Ayalew, Peter H. J. Chong, Yong Liang Guan:
Cooperative Cache Transfer-based On-demand Network Coded Broadcast in Vehicular Networks. ACM Trans. Embed. Comput. Syst. 18(4): 38:1-38:20 (2019) - Abbas Arghavani, Haibo Zhang, Zhiyi Huang, Yawen Chen:
Chimp: A Learning-based Power-aware Communication Protocol for Wireless Body Area Networks. ACM Trans. Embed. Comput. Syst. 18(2): 18:1-18:26 (2019) - Florian Arrestier, Karol Desnos, Eduardo Juárez, Daniel Ménard:
Numerical Representation of Directed Acyclic Graphs for Efficient Dataflow Embedded Resource Allocation. ACM Trans. Embed. Comput. Syst. 18(5s): 101:1-101:22 (2019) - Muhammad Ali Awan, Konstantinos Bletsas, Pedro F. Souto, Benny Akesson, Eduardo Tovar:
Techniques and Analysis for Mixed-criticality Scheduling with Mode-dependent Server Execution Budgets. ACM Trans. Embed. Comput. Syst. 18(5s): 109:1-109:23 (2019) - Levente Bajczi, András Vörös, Vince Molnár:
Will My Program Break on This Faulty Processor?: Formal Analysis of Hardware Fault Activations in Concurrent Embedded Software. ACM Trans. Embed. Comput. Syst. 18(5s): 89:1-89:21 (2019) - Kamyar Mirzazad Barijough, Zhuoran Zhao, Andreas Gerstlauer:
Quality/Latency-Aware Real-time Scheduling of Distributed Streaming IoT Applications. ACM Trans. Embed. Comput. Syst. 18(5s): 83:1-83:23 (2019) - Lejla Batina, Sherman S. M. Chow, Gerhard P. Hancke, Zhe Liu:
Introduction to the Special Issue on Cryptographic Engineering for Internet of Things: Security Foundations, Lightweight Solutions, and Attacks. ACM Trans. Embed. Comput. Syst. 18(3): 22:1-22:3 (2019) - Jan Baumeister, Bernd Finkbeiner, Maximilian Schwenger, Hazem Torfah:
FPGA Stream-Monitoring of Real-time Properties. ACM Trans. Embed. Comput. Syst. 18(5s): 88:1-88:24 (2019) - Bruce Belson, Jason Holdsworth, Wei Xiang, Bronson Philippa:
A Survey of Asynchronous Programming Using Coroutines in the Internet of Things and Embedded Systems. ACM Trans. Embed. Comput. Syst. 18(3): 21:1-21:21 (2019) - Kartikeya Bhardwaj, Chingyi Lin, Anderson L. Sartor, Radu Marculescu:
Memory- and Communication-Aware Model Compression for Distributed Deep Learning Inference on IoT. ACM Trans. Embed. Comput. Syst. 18(5s): 82:1-82:22 (2019) - Ganapati Bhat, Yigit Tuncel, Sizhe An, Hyung Gyu Lee, Ümit Y. Ogras:
An Ultra-Low Energy Human Activity Recognition Accelerator for Wearable Health Applications. ACM Trans. Embed. Comput. Syst. 18(5s): 49:1-49:22 (2019) - Hadi Brais, Preeti Ranjan Panda:
Alleria: An Advanced Memory Access Profiling Framework. ACM Trans. Embed. Comput. Syst. 18(5s): 81:1-81:22 (2019)
skipping 96 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-31 16:21 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint