default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 81 matches
- 2022
- Nikita Acharya, Miroslav Urbánek, Wibe A. de Jong, Samah Mohamed Saeed:
Test Points for Online Monitoring of Quantum Circuits. ACM J. Emerg. Technol. Comput. Syst. 18(1): 14:1-14:19 (2022) - Mohsen Riahi Alam, M. Hassan Najafi, Nima Taherinejad:
Sorting in Memristive Memory. ACM J. Emerg. Technol. Comput. Syst. 18(4): 69:1-69:21 (2022) - Manaar Alam, Sayandeep Saha, Debdeep Mukhopadhyay, Sandip Kundu:
NN-Lock: A Lightweight Authorization to Prevent IP Threats of Deep Learning Models. ACM J. Emerg. Technol. Comput. Syst. 18(3): 51:1-51:19 (2022) - N. Nalla Anandakumar, Mohammad S. Hashmi, Somitra Kumar Sanadhya:
Design and Analysis of FPGA-based PUFs with Enhanced Performance for Hardware-oriented Security. ACM J. Emerg. Technol. Comput. Syst. 18(4): 72:1-72:26 (2022) - Maitreyi Ashok, Matthew J. Turner, Ronald L. Walsworth, Edlyn V. Levine, Anantha P. Chandrakasan:
Hardware Trojan Detection Using Unsupervised Deep Learning on Quantum Diamond Microscope Magnetic Field Images. ACM J. Emerg. Technol. Comput. Syst. 18(4): 67:1-67:25 (2022) - Javad Bagherzadeh, Aporva Amarnath, Jielun Tan, Subhankar Pal, Ronald G. Dreslinski:
A Holistic Solution for Reliability of 3D Parallel Systems. ACM J. Emerg. Technol. Comput. Syst. 18(1): 23:1-23:27 (2022) - Mario Barbareschi, Salvatore Barone, Alberto Bosio, Jie Han, Marcello Traiola:
A Genetic-algorithm-based Approach to the Design of DCT Hardware Accelerators. ACM J. Emerg. Technol. Comput. Syst. 18(3): 50:1-50:25 (2022) - Arjun Chaudhuri, Sanmitra Banerjee, Jinwoo Kim, Heechun Park, Bon Woong Ku, Sukeshwar Kannan, Krishnendu Chakrabarty, Sung Kyu Lim:
Built-in Self-Test and Fault Localization for Inter-Layer Vias in Monolithic 3D ICs. ACM J. Emerg. Technol. Comput. Syst. 18(1): 22:1-22:37 (2022) - Vanessa Chen, Mohammad Al Faruque, Fadi J. Kurdahi:
Guest Editorial: Secure Radio-Frequency (RF)-Analog Electronics and Electromagnetics. ACM J. Emerg. Technol. Comput. Syst. 18(4): 63:1-63:2 (2022) - Yufei Chen, Tingtao Li, Qinming Zhang, Wei Mao, Nan Guan, Mei Tian, Hao Yu, Cheng Zhuo:
ANT-UNet: Accurate and Noise-Tolerant Segmentation for Pathology Image Processing. ACM J. Emerg. Technol. Comput. Syst. 18(2): 27:1-27:17 (2022) - Dwaipayan Choudhury, Aravind Sukumaran-Rajam, Ananth Kalyanaraman, Partha Pratim Pande:
High-Performance and Energy-Efficient 3D Manycore GPU Architecture for Accelerating Graph Analytics. ACM J. Emerg. Technol. Comput. Syst. 18(1): 18:1-18:19 (2022) - Josef Danial, Debayan Das, Anupam Golder, Santosh Ghosh, Arijit Raychowdhury, Shreyas Sen:
EM-X-DL: Efficient Cross-device Deep Learning Side-channel Attack With Noisy EM Signatures. ACM J. Emerg. Technol. Comput. Syst. 18(1): 4:1-4:17 (2022) - Anuj Dubey, Rosario Cammarota, Vikram B. Suresh, Aydin Aysu:
Guarding Machine Learning Hardware Against Physical Side-channel Attacks. ACM J. Emerg. Technol. Comput. Syst. 18(3): 56:1-56:31 (2022) - Hassnaa El-Derhalli, Léa Constans, Sébastien Le Beux, Alfredo De Rossi, Fabrice Raineri, Sofiène Tahar:
Towards All-optical Stochastic Computing Using Photonic Crystal Nanocavities. ACM J. Emerg. Technol. Comput. Syst. 18(1): 16:1-16:25 (2022) - Abdelrahman Elkanishy, Paul M. Furth, Derrick T. Rivera, Abdel-Hameed A. Badawy:
Low-overhead Hardware Supervision for Securing an IoT Bluetooth-enabled Device: Monitoring Radio Frequency and Supply Voltage. ACM J. Emerg. Technol. Comput. Syst. 18(1): 6:1-6:28 (2022) - Solon Falas, Charalambos Konstantinou, Maria K. Michael:
A Modular End-to-End Framework for Secure Firmware Updates on Embedded Systems. ACM J. Emerg. Technol. Comput. Syst. 18(1): 3:1-3:19 (2022) - Moritz Fieback, Guilherme Cardoso Medeiros, Lizhou Wu, Hassen Aziza, Rajendra Bishnoi, Mottaqiallah Taouil, Said Hamdioui:
Defects, Fault Modeling, and Test Development Framework for RRAMs. ACM J. Emerg. Technol. Comput. Syst. 18(3): 52:1-52:26 (2022) - Georgios Fragkos, Cyrus Minwalla, Eirini-Eleni Tsiropoulou, Jim Plusquellic:
Enhancing Privacy in PUF-Cash through Multiple Trusted Third Parties and Reinforcement Learning. ACM J. Emerg. Technol. Comput. Syst. 18(1): 7:1-7:26 (2022) - Saman Fröhlich, Saeideh Shirinzadeh, Rolf Drechsler:
Parallel Computing of Graph-based Functions in ReRAM. ACM J. Emerg. Technol. Comput. Syst. 18(2): 41:1-41:24 (2022) - Anteneh Gebregiorgis, Hoang Anh Du Nguyen, Jintao Yu, Rajendra Bishnoi, Mottaqiallah Taouil, Francky Catthoor, Said Hamdioui:
A Survey on Memory-centric Computer Architectures. ACM J. Emerg. Technol. Comput. Syst. 18(4): 79:1-79:50 (2022) - Saransh Gupta, Mohsen Imani, Joonseop Sim, Andrew Huang, Fan Wu, Jaeyoung Kang, Yeseong Kim, Tajana Simunic Rosing:
COSMO: Computing with Stochastic Numbers in Memory. ACM J. Emerg. Technol. Comput. Syst. 18(2): 37:1-37:25 (2022) - Said Hamdioui, Elena I. Vatajelu, Alberto Bosio:
Guest Editorial: Computation-In-Memory (CIM): from Device to Applications. ACM J. Emerg. Technol. Comput. Syst. 18(2): 31:1-31:3 (2022) - Haiyang Han, Theoni Alexoudi, Chris Vagionas, Nikos Pleros, Nikos Hardavellas:
A Practical Shared Optical Cache With Hybrid MWSR/R-SWMR NoC for Multicore Processors. ACM J. Emerg. Technol. Comput. Syst. 18(4): 76:1-76:28 (2022) - Jianhui Han, Xiang Fei, Zhaolin Li, Youhui Zhang:
Polyhedral-Based Compilation Framework for In-Memory Neural Network Accelerators. ACM J. Emerg. Technol. Comput. Syst. 18(1): 15:1-15:23 (2022) - Tianjin Huang, Vlado Menkovski, Yulong Pei, Yuhao Wang, Mykola Pechenizkiy:
Direction-aggregated Attack for Transferable Adversarial Examples. ACM J. Emerg. Technol. Comput. Syst. 18(3): 60:1-60:22 (2022) - Po-Hao Huang, Honggang Yu, Max Panoff, Ting-Chi Wang:
Generation of Black-box Audio Adversarial Examples Based on Gradient Approximation and Autoencoders. ACM J. Emerg. Technol. Comput. Syst. 18(3): 59:1-59:19 (2022) - Mehmet Ince, Bora Bilgic, Sule Ozev:
Digital Fault-based Built-in Self-test and Evaluation of Low Dropout Voltage Regulators. ACM J. Emerg. Technol. Comput. Syst. 18(3): 54:1-54:20 (2022) - Yier Jin, Tsung-Yi Ho, Stjepan Picek, Siddharth Garg:
Guest Editorial: Trustworthy AI. ACM J. Emerg. Technol. Comput. Syst. 18(3): 55:1-55:3 (2022) - Alexander Jones, Aaron Ruen, Rashmi Jha:
A Spiking Neuromorphic Architecture Using Gated-RRAM for Associative Memory. ACM J. Emerg. Technol. Comput. Syst. 18(2): 36:1-36:22 (2022) - Venkata Sai Praneeth Karempudi, Febin Sunny, Ishan G. Thakkar, Sai Vineel Reddy Chittamuru, Mahdi Nikdast, Sudeep Pasricha:
Photonic Networks-on-Chip Employing Multilevel Signaling: A Cross-Layer Comparative Study. ACM J. Emerg. Technol. Comput. Syst. 18(3): 45:1-45:36 (2022)
skipping 51 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-25 00:27 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint