Search

Showing total 292 results

Search Constraints

Start Over You searched for: Publication Year Range Last 3 years Remove constraint Publication Year Range: Last 3 years Publication Type Academic Journals Remove constraint Publication Type: Academic Journals Journal ieee transactions on computers Remove constraint Journal: ieee transactions on computers
292 results

Search Results

1. Colony: A Privileged Trusted Execution Environment With Extensibility.

2. Fast Generation of RSA Keys Using Smooth Integers.

3. A Low Complexity and Long Period Digital Random Sequence Generator Based on Residue Number System and Permutation Polynomial.

4. A Data Layout With Good Data Locality for Single-Machine Based Graph Engines.

5. Improving Interference Analysis for Real-Time DAG Tasks Under Partitioned Scheduling.

6. Regularity-Based Virtualization Under the ARINC 653 Standard for Embedded Systems.

7. Detecting Spectre Attacks Using Hardware Performance Counters.

8. Constructing Completely Independent Spanning Trees in a Family of Line-Graph-Based Data Center Networks.

9. Hardware-Assisted Malware Detection and Localization Using Explainable Machine Learning.

10. Spiking Generative Adversarial Networks With a Neural Network Discriminator: Local Training, Bayesian Models, and Continual Meta-Learning.

11. Accelerating Address Translation for Virtualization by Leveraging Hardware Mode.

12. Multiplicative Complexity of XOR Based Regular Functions.

13. A Reputation-Based Mechanism for Transaction Processing in Blockchain Systems.

14. Evaluation of Cache Attacks on Arm Processors and Secure Caches.

15. Memory-Aware Denial-of-Service Attacks on Shared Cache in Multicore Real-Time Systems.

16. $\mathsf{MC{-}FLEX}$ MC - FLEX : Flexible Mixed-Criticality Real-Time Scheduling by Task-Level Mode Switch.

17. Learned FBF: Learning-Based Functional Bloom Filter for Key–Value Storage.

18. Efficient, Flexible, and Constant-Time Gaussian Sampling Hardware for Lattice Cryptography.

19. A Data Layout and Fast Failure Recovery Scheme for Distributed Storage Systems With Mixed Erasure Codes.

20. Real-Time Task Scheduling for Machine Perception in Intelligent Cyber-Physical Systems.

21. Polynomial Computation Using Unipolar Stochastic Logic and Correlation Technique.

22. Malware Analysis by Combining Multiple Detectors and Observation Windows.

23. Multi-Bank On-Chip Memory Management Techniques for CNN Accelerators.

25. Efficient Software Implementation of the SIKE Protocol Using a New Data Representation.

26. Affinity-Aware VNF Placement in Mobile Edge Clouds via Leveraging GPUs.

27. ReAAP: A Reconfigurable and Algorithm-Oriented Array Processor With Compiler-Architecture Co-Design.

28. Algorithm and Hardware Co-Design of Energy-Efficient LSTM Networks for Video Recognition With Hierarchical Tucker Tensor Decomposition.

29. End-to-End Synthesis of Dynamically Controlled Machine Learning Accelerators.

30. EGCN: An Efficient GCN Accelerator for Minimizing Off-Chip Memory Access.

31. WBMatrix: An Optimized Matrix Library for White-Box Block Cipher Implementations.

32. vTrust: Remotely Executing Mobile Apps Transparently With Local Untrusted OS.

33. Future Scaling of Memory Hierarchy for Tensor Cores and Eliminating Redundant Shared Memory Traffic Using Inter-Warp Multicasting.

34. CAMDNN: Content-Aware Mapping of a Network of Deep Neural Networks on Edge MPSoCs.

35. Blockchain-Cloud Transparent Data Marketing: Consortium Management and Fairness.

36. Probabilistically Guaranteeing End-to-End Latencies in Autonomous Vehicle Computing Systems.

37. Extending On-Chain Trust to Off-Chain – Trustworthy Blockchain Data Collection Using Trusted Execution Environment (TEE).

38. FLiMS: A Fast Lightweight 2-Way Merger for Sorting.

39. CloudChain: A Cloud Blockchain Using Shared Memory Consensus and RDMA.

40. A Systematic View of Model Leakage Risks in Deep Neural Network Systems.

41. Unsupervised Spiking Instance Segmentation on Event Data Using STDP Features.

42. OpenHD: A GPU-Powered Framework for Hyperdimensional Computing.

43. ParaX : Bandwidth-Efficient Instance Assignment for DL on Multi-NUMA Many-Core CPUs.

44. Lightweight, Effective Detection and Characterization of Mobile Malware Families.

45. GANDAFL: Dataflow Acceleration for Short Read Alignment on NGS Data.

46. SOT-MRAM Digital PIM Architecture With Extended Parallelism in Matrix Multiplication.

47. Better Adaptive Malicious Users Detection Algorithm in Human Contact Networks.

48. Time-Memory Trade-Offs for Saber+ on Memory-Constrained RISC-V Platform.

49. Stereo: Assignment and Scheduling in MPSoC Under Process Variation by Combining Stochastic and Decomposition Approaches.

50. A Decentralized Mechanism Based on Differential Privacy for Privacy-Preserving Computation in Smart Grid.