Search

Showing total 10,809 results

Search Constraints

Start Over You searched for: Search Limiters Academic (Peer-Reviewed) Journals Remove constraint Search Limiters: Academic (Peer-Reviewed) Journals Journal ieee transactions on computers Remove constraint Journal: ieee transactions on computers
10,809 results

Search Results

1. Comments on Duprat and Muller's Branching CORDIC paper

2. Colony: A Privileged Trusted Execution Environment With Extensibility.

3. Fast Generation of RSA Keys Using Smooth Integers.

4. A Low Complexity and Long Period Digital Random Sequence Generator Based on Residue Number System and Permutation Polynomial.

6. A Data Layout With Good Data Locality for Single-Machine Based Graph Engines.

7. Improving Interference Analysis for Real-Time DAG Tasks Under Partitioned Scheduling.

8. Regularity-Based Virtualization Under the ARINC 653 Standard for Embedded Systems.

10. Detecting Spectre Attacks Using Hardware Performance Counters.

11. Constructing Completely Independent Spanning Trees in a Family of Line-Graph-Based Data Center Networks.

13. Handling Transients of Dynamic Real-Time Workload Under EDF Scheduling.

22. Hardware-Assisted Malware Detection and Localization Using Explainable Machine Learning.

23. Spiking Generative Adversarial Networks With a Neural Network Discriminator: Local Training, Bayesian Models, and Continual Meta-Learning.

24. Accelerating Address Translation for Virtualization by Leveraging Hardware Mode.

25. Multiplicative Complexity of XOR Based Regular Functions.

26. A Reputation-Based Mechanism for Transaction Processing in Blockchain Systems.

31. Evaluation of Cache Attacks on Arm Processors and Secure Caches.

32. Memory-Aware Denial-of-Service Attacks on Shared Cache in Multicore Real-Time Systems.

33. $\mathsf{MC{-}FLEX}$ MC - FLEX : Flexible Mixed-Criticality Real-Time Scheduling by Task-Level Mode Switch.

34. Learned FBF: Learning-Based Functional Bloom Filter for Key–Value Storage.

35. Efficient, Flexible, and Constant-Time Gaussian Sampling Hardware for Lattice Cryptography.

36. Real-Time Task Scheduling for Machine Perception in Intelligent Cyber-Physical Systems.

37. A Data Layout and Fast Failure Recovery Scheme for Distributed Storage Systems With Mixed Erasure Codes.

38. The Security of ARM TrustZone in a FPGA-Based SoC.

39. Efficient Mitchell’s Approximate Log Multipliers for Convolutional Neural Networks.

40. Predicting the Effect of Memory Contention in Multi-Core Computers Using Analytic Performance Models.

41. Dynamic Voltage Scaling in Multitier Web Servers with End-to-End Delay Control.

42. Schedulability Analysis for Real-Time Task Set on Resource with Performance Degradation and Dual-Level Periodic Rejuvenations.

43. Reducing the Memory Bandwidth Overheads of Hardware Security Support for Multi-Core Processors.

44. Decimal Multiformat Online Addition.

45. Malware Analysis by Combining Multiple Detectors and Observation Windows.

46. Polynomial Computation Using Unipolar Stochastic Logic and Correlation Technique.

47. Multi-Bank On-Chip Memory Management Techniques for CNN Accelerators.

48. New Results on Non-Normalized Floating-Point Formats.

49. Sharing Logic for Built-In Generationof Functional Broadside Tests.