| Multipliers With Approximate 4-2 Compressors and Error Recovery Modules |
12 |
| Parallel Enumeration of Custom Instructions Based on Multidepth Graph Partitioning |
11 |
| Embedding Encryption and Machine Learning Intrusion Prevention Systems on Programmable Logic Controllers |
10 |
| Securing Hardware Accelerators: A New Challenge for High-Level Synthesis |
7 |
| A Taxonomy of General Purpose Approximate Computing Techniques |
5 |
| i-DPs CGRA: An Interleaved-Datapaths Reconfigurable Accelerator for Embedded Bio-Signal Processing |
4 |
| Dynamic Scheduling of Real-Time Tasks in Heterogeneous Multicore Systems |
4 |
| Stack Redundancy to Thwart Return Oriented Programming in Embedded Systems |
4 |
| The IoT Energy Challenge: A Software Perspective |
3 |
| Fast Content Updating Algorithm for an SRAM-Based TCAM on FPGA |
3 |
| Beyond the Limits of Typical Strategies: Resources Efficient FPGA-Based TCAM |
3 |
| The Misconception of Exponential Tail Upper-Bounding in Probabilistic Real Time |
3 |
| NVALT: Nonvolatile Approximate Lookup Table for GPU Acceleration |
3 |
| A 64 kB Approximate SRAM Architecture for Low-Power Video Applications |
3 |
| Test and Reliability Challenges for Approximate Circuitry |
2 |
| Co-Synthesis of Loop Execution Patterns for Multihop Control Networks |
2 |
| Dataflow-Functional High-Level Synthesis for Coarse-Grained Reconfigurable Accelerators |
2 |
| Automatic Energy-Minimized HW/SW Partitioning for FPGA-Accelerated MPSoCs |
2 |
| Device Access Abstractions for Resilient Information Architecture Platform for Smart Grid |
2 |
| HotSniper: Sniper-Based Toolchain for Many-Core Thermal Simulations in Open Systems |
2 |
| Estimation of Maximum Speed-Up in Multicore-Based Mobile Devices |
2 |
| Cappuccino: Efficient CNN Inference Software Synthesis for Mobile System-on-Chips |
2 |
| RoadNet: An 80-mW Hardware Accelerator for Road Detection |
2 |
| Using Approximate Computing for the Calculation of Inverse Matrix pth Roots |
2 |
| A Novel Heterogeneous Approximate Multiplier for Low Power and High Performance |
2 |
| SVM-Based Dynamic Voltage Prediction for Online Thermally Constrained Task Scheduling in 3-D Multicore Processors |
2 |
| Rapid Integration of CPS Security and Safety |
2 |
| Data Reduction Using Integrated Adaptive Filters for Energy-Efficient in the Clusters of Wireless Sensor Networks |
2 |
| Post-Quantum Enabled Cyber Physical Systems |
2 |
| OpenNoC: An Open-Source NoC Infrastructure for FPGA-Based Hardware Acceleration |
1 |
| Toward Error-Correcting Architectures for Cryptographic Circuits Based on Rabii-Keren Codes |
1 |
| Efficient Arithmetic Error Rate Calculus for Visibility Reduced Approximate Adders |
1 |
| Customized Instructions for Protection Against Memory Integrity Attacks |
1 |
| Parallel and Pipelined 2-D Median Filter Architecture |
1 |
| Feasibility Interval for Fixed-Priority Scheduling of Mixed-Criticality Periodic Tasks With Offsets |
1 |
| GANDALF: A Fine-Grained Hardware-Software Co-Design for Preventing Memory Attacks |
1 |
| HDGM: Hierarchical Dynamic Goal Management for Many-Core Resource Allocation |
1 |
| Decoupled Branch Predictor for Embedded DSP |
1 |
| Sensor Signal Processing Using High-Level Synthesis With a Layered Architecture |
1 |
| Uniform Minimal First: Latency Reduction in Throughput-Optimal Oblivious Routing for Mesh-Based Networks-on-Chip |
1 |
| Design of an Embedded Communication System for Underwater Asynchronous Localization |
1 |
| Data-Dependent Loop Approximations for Performance-Quality Driven High-Level Synthesis |
1 |
| Validity of Software Verification Results on Approximate Hardware |
0 |
| Revisiting AES SBox Composite Field Implementations for FPGAs |
0 |
| Memristor-Based Hybrid Fault Tolerant Structure With Concurrent Reconfigurability |
0 |
| FIFA: Exploring a Focally Induced Fault Attack Strategy in Near-Threshold Computing |
0 |
| Cross Hardware-Software Boundary Exploration for Scalable and Optimized Deep Learning Platform Design |
0 |
| Performance, Security Tradeoffs in Secure Control |
0 |
| An Instruction-Level Quality-Aware Method for Exploiting STT-RAM Read Approximation Techniques |
0 |
| Anatomy of Memory Corruption Attacks and Mitigations in Embedded Systems |
0 |