Abstract is missing.
- Towards Polynomial Formal Verification of Complex Arithmetic CircuitsRolf Drechsler, Alireza Mahzoon, Mehran Goli. 1-6 [doi]
- Dependability of Alternative Computing Paradigms for Machine Learning: hype or hope?Cristiana Bolchini, Alberto Bosio, Luca Cassano, Bastien Deveautour, Giorgio Di Natale, Antonio Miele, Ian O'Connor, Elena Ioana Vatajelu. 7-13 [doi]
- Virtual Prototype driven Design, Implementation and Evaluation of RISC-V Instruction Set ExtensionsMilan Funck, Vladimir Herdt, Rolf Drechsler. 14-19 [doi]
- Early Performance Estimation of Embedded Software on RISC-V Processor using Linear RegressionWeiyan Zhang, Mehran Goli, Rolf Drechsler. 20-25 [doi]
- Processor Extensions for Hardware Instruction Replay against Fault Injection AttacksNoura Ait Manssour, Vianney Lapôtre, Guy Gogniat, Arnaud Tisserand. 26-31 [doi]
- AµFLIPS: An Asynchronous Microprocessor With FLexIbly-timed Pipeline StagesZaheer Tabassam, Syed Rameez Naqvi, Andreas Steininger. 32-37 [doi]
- A Design Space Exploration Framework for Memristor-Based Crossbar ArchitectureMario Barbareschi, Alberto Bosio, Ian O'Connor, Petr Fiser, Marcello Traiola. 38-43 [doi]
- ArithsGen: Arithmetic Circuit Generator for Hardware AcceleratorsJan Klhufek, Vojtech Mrazek. 44-47 [doi]
- Hexapod robotic system for indoor neutron and gamma radiation mapping and inspectionAntonis Banos, Yannick Verbelen, Suresh Kaluvan, Chris Hutson, Matthew Ryan Tucker, Tom B. Scott 0001. 48-53 [doi]
- Autocalibration Approach for Improving Robustness of Analog ICsDavid Maljar, Daniel Arbet, Martin Kovác, Róbert Ondica, Viera Stopjaková. 54-59 [doi]
- On-Chip Current Sensing Approaches for DC-DC ConvertersRichard Ravasz, Adam Hudec, Daniel Arbet, Viera Stopjaková. 64-67 [doi]
- Hardware Obfuscation of Digital FIR FiltersLevent Aksoy, Alexander Hepp, Johanna Baehr, Samuel Pagliarini. 68-73 [doi]
- Exploiting PUF Variation to Detect Fault Injection AttacksTroya Çagil Köylü, Luíza C. Garaffa, Cezar Reinbrecht, Mahdi Zahedi, Said Hamdioui, Mottaqiallah Taouil. 74-79 [doi]
- Versatile Hardware Framework for Elliptic Curve CryptographyVít Masek, Martin Novotný. 80-83 [doi]
- Correlation Power Analysis of SipHashMatús Oleksák, Vojtech Miskovský. 84-87 [doi]
- Analyzing Dynamic Aspects of AxC Systems by Means of Statistical Model CheckingJosef Strnadel. 88-93 [doi]
- Functional Verification of Arithmetic Circuits: Survey of Formal MethodsMaciej J. Ciesielski, Atif Yasin, Jiteshri Dasari. 94-99 [doi]
- On SAT-Based Model Checking of Speed-Independent CircuitsFlorian Huemer, Robert Najvirt, Andreas Steininger. 100-105 [doi]
- Synaptic Control for Hardware Implementation of Spike Timing Dependent PlasticitySalah Daddinounou, Elena Ioana Vatajelu. 106-111 [doi]
- Programmable logic elements using multigate ambipolar transistorsAshton Snelgrove, Pierre-Emmanuel Gaillardon. 112-117 [doi]
- A Concept Towards Pressure-Controlled Microfluidic NetworksGerold Fink, Medina Hamidovic, Werner Haselmayr, Robert Wille. 118-123 [doi]
- Stochastic Computing Architectures for Lightweight LSTM Neural NetworksRoshwin Sengupta, Ilia Polian, John P. Hayes. 124-129 [doi]
- Analyzing Multilevel Stochastic Circuits using Correlation MatricesOwen Hoffend, John P. Hayes. 130-135 [doi]
- Selective Hardening of Critical Neurons in Deep Neural NetworksAnnachiara Ruospo, Gabriele Gavarini, Ilaria Bragaglia, Marcello Traiola, Alberto Bosio, Ernesto Sánchez 0001. 136-141 [doi]
- Exploring Software Models for the Resilience Analysis of Deep Learning Accelerators: the NVDLA Case StudyAlessandro Veronesi, Francesco Dall'Occo, Davide Bertozzi, Michele Favalli, Milos Krstic. 142-147 [doi]
- Fault Tolerant Synchronous Multi-Channel Buck Converter for Nuclear Inspection InstrumentsYannick Verbelen, Antonios Banos, Tom B. Scott 0001. 148-153 [doi]
- Hardware Accelerated FrodoKEM on RISC-VPatrick Karl, Tim Fritzmann, Georg Sigl. 154-159 [doi]
- Equivalence Checking of System-Level and SPICE-Level Models of Linear Analog FiltersKemal Çaglar Coskun, Muhammad Hassan 0002, Rolf Drechsler. 160-165 [doi]
- ML-based Power Estimation of Convolutional Neural Networks on GPGPUsChristopher A. Metz, Mehran Goli, Rolf Drechsler. 166-171 [doi]
- On the optimization of Software Obfuscation against Hardware Trojans in MicroprocessorsLuca Cassano, Elia Lazzeri, Nikita Litovchenko, Giorgio Di Natale. 172-177 [doi]