Search

Your search keyword '"Netlist"' showing total 1,921 results

Search Constraints

Start Over You searched for: Descriptor "Netlist" Remove constraint Descriptor: "Netlist"
1,921 results on '"Netlist"'

Search Results

301. A Flexible Online Checking Technique to Enhance Hardware Trojan Horse Detectability by Reliability Analysis

302. Quantum circuit physical design flow for 2D nearest-neighbor architectures

303. LUT based realization of fixed-point multipliers targeting state-of-art FPGAs

304. COTD: Reference-Free Hardware Trojan Detection and Recovery Based on Controllability and Observability in Gate-Level Netlist

305. A HW/SW Cross-Layer Approach for Determining Application-Redundant Hardware Faults in Embedded Systems

306. An Automated Design Methodology of RF Circuits by Using Pareto-Optimal Fronts of EM-Simulated Inductors

307. FPGA implementation of on-chip ANN for breast cancer diagnosis

308. Yield-aware sizing of pipeline ADC using a multiple-objective evolutionary algorithm

309. Verilog Loop Unrolling, Module Generation, Part-Select and Arithmetic Right Shift Support in Odin II

310. SAT to SAT-hard clause translator

311. Input Elimination Transformations for Scalable Verification and Trace Reconstruction

312. Exploring area and total wirelength using a cell merging technique

313. CongestionNet: Routing Congestion Prediction Using Deep Graph Neural Networks

314. Netlist Optimization by Gate Merging

315. FNSim: A Device-Circuit-Algorithm Codesigned Simulator for Flash based Neural Network

316. Design Enablement of Fine Pitch Face-to-Face 3D System Integration using Die-by-Die Place & Route

317. Teaching Hardware Reverse Engineering: Educational Guidelines and Practical Insights

318. An Improved Automatic Hardware Trojan Generation Platform

319. Post-SAT 2: Insertion of SAT-Unresolvable Structures

320. Post-SAT 1: Point Function-Based Logic Locking

321. Side-Channel Attacks

322. Comparison of BBSPICE to PEEC Equivalent Circuit Models for Simulation of Floating PCB Above Ground Plane

323. Enabling fast power integrity transient analysis through parameterized small-signal macromodels

324. Congestion-aware Global Routing using Deep Convolutional Generative Adversarial Networks

325. System-Level Framework for Logic Obfuscation with Quantified Metrics for Evaluation

326. Low-Level Loop Analysis and Pipelining of Applications Mapped to Xilinx FPGAs

327. Amplifier-based MOS analog neural network implementation and weights optimization

328. A software platform for ISFET simulation based on open source tools to fit model parameters

329. Hardware-Software Co-Design Based Obfuscation of Hardware Accelerators

330. Layout versus Schematic with Design/Magnetic Rule Checking for Superconducting Integrated Circuit Layouts

331. A Logic Simplification Approach for Very Large Scale Crosstalk Circuit Designs

332. Towards Data-Driven Approximate Circuit Design

333. A Structure-Based Methodology for Analog Layout Generation

334. Parasitic Extraction Methodology for MEMS Sensors with Active Devices

335. Automatic Modeling of Transistor Level Circuits by Hybrid Systems with Parameter Variable Matrices

336. Design and Verification of Analog Integrated Circuits Using Free or Open source EDA Tools

337. Deep State Encryption for Sequential Logic Circuits

338. An automated approximation methodology for arithmetic circuits

339. Comprehensive Search for ECO Rectification Using Symbolic Sampling

340. High Performance Graph Convolutional Networks with Applications in Testability Analysis

341. RevSCA

342. ALIGN

343. A Novel Characterization Method of Click Element Based on Cutting Feedback Loops in Standard Cell Library Design

344. A method to transform synchronous pipeline circuits to bundled-data asynchronous circuits using commercial EDA tools

345. A Majority Logic Synthesis Framework for Adiabatic Quantum-Flux-Parametron Superconducting Circuits

346. Improving on State Register Identification in Sequential Hardware Reverse Engineering

347. Exploiting Proximity Information in a Satisfiability Based Attack Against Split Manufactured Circuits

348. On the Impossibility of Approximation-Resilient Circuit Locking

349. Increasing the SAT Attack Resiliency of In-Cone Logic Locking

350. Energy proportional neural network inference with adaptive voltage and frequency scaling

Catalog

Books, media, physical & digital resources