Search

Showing total 10,839 results

Search Constraints

Start Over You searched for: Search Limiters Full Text Remove constraint Search Limiters: Full Text Journal ieee transactions on computers Remove constraint Journal: ieee transactions on computers Publisher ieee Remove constraint Publisher: ieee
10,839 results

Search Results

1. Colony: A Privileged Trusted Execution Environment With Extensibility.

2. Fast Generation of RSA Keys Using Smooth Integers.

3. A Low Complexity and Long Period Digital Random Sequence Generator Based on Residue Number System and Permutation Polynomial.

5. A Data Layout With Good Data Locality for Single-Machine Based Graph Engines.

6. Improving Interference Analysis for Real-Time DAG Tasks Under Partitioned Scheduling.

7. Regularity-Based Virtualization Under the ARINC 653 Standard for Embedded Systems.

9. Detecting Spectre Attacks Using Hardware Performance Counters.

10. Constructing Completely Independent Spanning Trees in a Family of Line-Graph-Based Data Center Networks.

12. Handling Transients of Dynamic Real-Time Workload Under EDF Scheduling.

21. Hardware-Assisted Malware Detection and Localization Using Explainable Machine Learning.

22. Spiking Generative Adversarial Networks With a Neural Network Discriminator: Local Training, Bayesian Models, and Continual Meta-Learning.

23. Accelerating Address Translation for Virtualization by Leveraging Hardware Mode.

24. Multiplicative Complexity of XOR Based Regular Functions.

29. A Reputation-Based Mechanism for Transaction Processing in Blockchain Systems.

30. Evaluation of Cache Attacks on Arm Processors and Secure Caches.

31. Memory-Aware Denial-of-Service Attacks on Shared Cache in Multicore Real-Time Systems.

32. $\mathsf{MC{-}FLEX}$ MC - FLEX : Flexible Mixed-Criticality Real-Time Scheduling by Task-Level Mode Switch.

33. Learned FBF: Learning-Based Functional Bloom Filter for Key–Value Storage.

34. Efficient, Flexible, and Constant-Time Gaussian Sampling Hardware for Lattice Cryptography.

35. A Data Layout and Fast Failure Recovery Scheme for Distributed Storage Systems With Mixed Erasure Codes.

36. Real-Time Task Scheduling for Machine Perception in Intelligent Cyber-Physical Systems.

37. The Security of ARM TrustZone in a FPGA-Based SoC.

38. Efficient Mitchell’s Approximate Log Multipliers for Convolutional Neural Networks.

39. Predicting the Effect of Memory Contention in Multi-Core Computers Using Analytic Performance Models.

40. Dynamic Voltage Scaling in Multitier Web Servers with End-to-End Delay Control.

41. Schedulability Analysis for Real-Time Task Set on Resource with Performance Degradation and Dual-Level Periodic Rejuvenations.

42. Reducing the Memory Bandwidth Overheads of Hardware Security Support for Multi-Core Processors.

43. Polynomial Computation Using Unipolar Stochastic Logic and Correlation Technique.

44. Malware Analysis by Combining Multiple Detectors and Observation Windows.

45. Multi-Bank On-Chip Memory Management Techniques for CNN Accelerators.

46. New Results on Non-Normalized Floating-Point Formats.

47. Sharing Logic for Built-In Generationof Functional Broadside Tests.

50. Towards the Integration of Reverse Converters into the RNS Channels.