Search

Showing total 42 results

Search Constraints

Start Over You searched for: Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection Topic robustness Remove constraint Topic: robustness Journal ieee transactions on computer-aided design of integrated circuits & systems Remove constraint Journal: ieee transactions on computer-aided design of integrated circuits & systems
42 results

Search Results

1. Low Cost Functional Obfuscation of Reusable IP Ores Used in CE Hardware Through Robust Locking.

2. Cost-Effective Robustness in Clock Networks Using Near-Tree Structures.

3. On the Generation of Waveform-Accurate Hazard and Charge-Sharing Aware Tests for Transistor Stuck-Off Faults in CMOS Logic Circuits.

4. Thermal Aware Test Scheduling for NTV Circuit.

5. Gaussian Fitness Functions for Optimizing Analog CMOS Integrated Circuits.

6. Robust and Efficient Transistor-Level Envelope-Following Analysis of PWM/PFM/PSM DC-DC Converters.

7. An Algebraic Framework for Runtime Verification.

8. LSCD: A Low-Storage Clone Detection Protocol for Cyber-Physical Systems.

9. Scalable Synthesis of PCHB–WCHB Hybrid Quasi-Delay Insensitive Circuits.

10. Detailed Placement Algorithm for VLSI Design With Double-Row Height Standard Cells.

11. Assertion Aware Sampling Refinement: A Mixed-Signal Perspective.

12. Optimal Generalized H-Tree Topology and Buffering for High-Performance and Low-Power Clock Distribution.

13. Rapid Assessment of Design Sensitivity to Process Excursions via Scaled Sigma Sampling.

14. Adaptive Test With Test Escape Estimation for Mixed-Signal ICs.

15. Reachability-Based Robustness Verification and Optimization of SRAM Dynamic Stability Under Process Variations.

16. Variation-Aware Geometric Programming Models for the Clock Network Buffer Sizing Problem.

17. Subtractive Router for Tree-Driven-Grid Clocks.

18. Analytical Optimization of Bit-Widths in Fixed-Point LTI Systems.

19. Analysis of SRAM and eDRAM Cache Memories Under Spatial Temperature Variations.

20. Robust Optimization of Test-Access Architectures Under Realistic Scenarios.

21. Ripple: A Robust and Effective Routability-Driven Placer.

22. Formal Guarantees for Localized Bug Fixes.

23. MARS: Matching-Driven Analog Sizing.

24. On-Chip Diagnosis of Generalized Delay Failures Using Compact Fault Dictionaries.

25. NTHU-Route 2.0: A Robust Global Router for Modern Designs.

26. Modeling of Failure Probability and Statistical Design of SRAM Array for Yield Enhancement in Nanoscaled CMOS.

27. TEA-Z: A Tiny and Efficient Architecture Based on Z Channel for Image Watermarking and Its Versatile Hardware Implementation.

28. Energy-Efficient DNN Inference on Approximate Accelerators Through Formal Property Exploration.

29. Online Reset for Signal Temporal Logic Monitoring.

30. Correlation Integral-Based Intrinsic Dimension: A Deep-Learning-Assisted Empirical Metric to Estimate the Robustness of Physically Unclonable Functions to Modeling Attacks.

31. EI-NK: A Robust Exponential Integrator Method With Singularity Removal and Newton–Raphson Iterations for Transient Nonlinear Circuit Simulation.

32. Noise Sensitivity-Based Energy Efficient and Robust Adversary Detection in Neural Networks.

33. Regular Analog/RF Integrated Circuits Design Using Optimization With Recourse Including Ellipsoidal Uncertainty.

34. Training Data Poisoning in ML-CAD: Backdooring DL-Based Lithographic Hotspot Detectors.

35. Enhancing Temporal Logic Falsification With Specification Transformation and Valued Booleans.

36. Hybrid System Falsification Under (In)equality Constraints via Search Space Transformation.

37. Safety Verification for Random Ordinary Differential Equations.

38. Two-Layered Falsification of Hybrid Systems Guided by Monte Carlo Tree Search.

39. Robust Optimization of Multiple Timing Constraints.

40. Automated Range and Precision Bit-Width Allocation for Iterative Computations.

41. Efficient Data Structures and Methodologies for SAT-Based ATPG Providing High Fault Coverage in Industrial Application.

42. Effective Robustness Analysis Using Bounded Model Checking Techniques.