default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 537 matches
- 2024
- M. Akif Özkan:
Declarative Programming Techniques for Hardware Synthesis of Image Processing Applications. University of Erlangen-Nuremberg, Germany, 2024 - Gianpiero Cabodi, Paolo E. Camurati, Marco Palena, Paolo Pasini:
Hardware Model Checking Algorithms and Techniques. Algorithms 17(6): 253 (2024) - C. Ravichandran, T. J. Nagalakshmi, P. Shyamala Bharathi, C. Sivakumaran:
Technique for detecting hardware-based Trojans using a convolutional neural network. Int. J. Inf. Comput. Secur. 23(3): 338-347 (2024) - Chunqiang Li, Zhiwei Liu, Yunhai Shang, Lenian He, Xiaolang Yan:
SPC-Indexed Indirect Branch Hardware Cache Redirecting Technique in Binary Translation. J. Circuits Syst. Comput. 33(13): 2450242:1-2450242:24 (2024) - Mehwish Raza, Sharjeel Javed, Majida Kazmi, Arshad Aziz, Muhammad Fahim Ul Haque, Saad Ahmed Qazi:
Approximate Computing: Hardware and Software Techniques, Tools and Their Applications. J. Circuits Syst. Comput. 33(4): 2430001:1-2430001:61 (2024) - Muhammad Zohaib Butt, Nazri Nasir, Rozeha Bt A rashid:
A review of perception sensors, techniques, and hardware architectures for autonomous low-altitude UAVs in non-cooperative local obstacle avoidance. Robotics Auton. Syst. 173: 104629 (2024) - Yu Xie, Stefan Oniga:
A Comprehensive Review of Hardware Acceleration Techniques and Convolutional Neural Networks for EEG Signals. Sensors 24(17): 5813 (2024) - Yves Le Traon, Tao Xie:
Investigating fault injection techniques in hardware-based deep neural networks and mutation-based fault localization. Softw. Test. Verification Reliab. 34(4) (2024) - Xin Zhao, Liang Chang, Dongqi Fan, Zhicheng Hu, Ting Yue, Fengbin Tu, Jun Zhou:
HDSuper: High-Quality and High Computational Utilization Edge Super-Resolution Accelerator With Hardware-Algorithm Co-Design Techniques. IEEE Trans. Circuits Syst. I Regul. Pap. 71(4): 1679-1692 (2024) - Tai Yue, Fengwei Zhang, Zhenyu Ning, Pengfei Wang, Xu Zhou, Kai Lu, Lei Zhou:
Armor: Protecting Software Against Hardware Tracing Techniques. IEEE Trans. Inf. Forensics Secur. 19: 4247-4262 (2024) - Jian Cheng, Quanyuan Feng, Chao Li, Wenxiu Yang:
Securing FPGAs in IoT: a new run-time monitoring technique against hardware Trojan. Wirel. Networks 30(6): 5455-5463 (2024) - Naveenkumar R, N. M. Sivamangai:
Hardware Trojans Detection and Prevention Techniques Review. Wirel. Pers. Commun. 136(2): 1147-1182 (2024) - Monji Zaidi, Imen Bouazzi:
A novel hardware-based technique for wireless sensor networks balancing power consumption with error location. ATSIP 2024: 50-54 - Alireza Abolhasani Zeraatkar, Parnian Shabani Kamran, Hussain Al-Asaad:
Advancements in Secure Computing: Exploring Automated Repair Debugging and Verification Techniques for Hardware Design. CCWC 2024: 357-364 - Tishya Sarma Sarkar, Shuvodip Maitra, Abhishek Chakraborty, Akashdeep Saha, Joydeep Chowdhury, Debdeep Mukhopadhyay:
X-Factor: Deep Learning-based PCB Counterfeit Detection using X-Ray CT Techniques for Hardware Assurance. CF (Companion) 2024 - Mahboobe Sadeghipour Roodsari, Jonas Krautter, Mehdi B. Tahoori:
OTFGEncoder - HDC: Hardware-efficient Encoding Techniques for Hyperdimensional Computing. DATE 2024: 1-2 - Lokesh Maji, Aman Prajapati, Madhav Rao:
Design and Evaluation of Parametric NTT Hardware Unit using different Multiplier based Modular Reduction Techniques. ISQED 2024: 1-6 - Sapta Girish Neelam, P. R. Sahu:
Detection Techniques for SISO/MIMO-OTSM Systems with Hardware Impairments Under High Mobility Scenarios. NCC 2024: 1-6 - Md. Najrul Islam, Rahul Shrestha, Shubhajit Roy Chowdhury:
Low-Complexity lassification Technique and Hardware-Efficient Classify-Unit Architecture for CNN Accelerator. VLSID 2024: 210-215 - 2023
- Foroozan Karimzadeh:
Hardware-Friendly Model Compression techniques for Deep Learning Accelerators. Georgia Institute of Technology, Atlanta, GA, USA, 2023 - Bonaventura Del Monte:
Hardware-conscious techniques for efficient and reliable stateful stream processing. Technical University of Berlin, Germany, 2023 - Asma Mabrouk, Rafik Zayani:
Toward Energy-Efficient 6G Networks: Uplink Cell-Free Massive MIMO With NLD Cancellation Technique of Hardware Impairments. IEEE Access 11: 105314-105329 (2023) - Randy Lozada Dominguez, Juan Sebastián Betancourt Perlaza, Enrique San Millán:
Time Synchronization Technique Hardware Implementation for OFDM Systems With Hermitian Symmetry for VLC Applications. IEEE Access 11: 42222-42233 (2023) - E. Praveen Kumar, S. Priyanka:
A comprehensive survey on hardware-assisted malware analysis and primitive techniques. Comput. Networks 235: 109967 (2023) - Argyrios Sideris, Minas Dasygenis:
Enhancing the Hardware Pipelining Optimization Technique of the SHA-3 via FPGA. Comput. 11(8): 152 (2023) - Giorgos Armeniakos, Georgios Zervakis, Dimitrios Soudris, Jörg Henkel:
Hardware Approximate Techniques for Deep Neural Network Accelerators: A Survey. ACM Comput. Surv. 55(4): 83:1-83:36 (2023) - Ilmo Salmenperá, Jukka K. Nurminen:
Software techniques for training restricted Boltzmann machines on size-constrained quantum annealing hardware. Frontiers Comput. Sci. 5 (2023) - Vinaya Chandrakant Chavan, Suresh Mikkili:
Hardware implementation of proposed and conventional PV array reconfiguration techniques to extract maximum power under various shading conditions. Int. J. Circuit Theory Appl. 51(11): 5269-5282 (2023) - Priyanka Bagul, Vandana Inamdar:
Hardware Obfuscation Based Watermarking Technique for IPR Ownership Identification. Int. J. Reconfigurable Comput. 2023: 4550758:1-4550758:13 (2023) - Vijaypal Singh Rathor, G. K. Sharma:
A New ATPG and Online Monitoring based Technique for Hardware Trojan Detection. Microprocess. Microsystems 101: 104903 (2023)
skipping 507 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-20 17:32 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint