Abstract is missing.
- Hybrid Hardware-Software Architecture for Quantum Secure IoT Embedded SystemsAobo Li, Jiahao Lu, Dongsheng Liu, Xiang Li, Shuo Yang, Jiaming Zhang, Tianze Huang, Siqi Xiong. 1-8 [doi]
- Revealing Secret Key from Low Success Rate Deep Learning-Based Side Channel AttacksVan-Phuc Hoang, Ngoc-Tuan Do, Trong-Thuc Hoang, Cong-Kha Pham. 9-14 [doi]
- Multi-objective Optimisation of RISC-V CV32A6 for ML applicationBastien Hubert, Omar Hammami. 15-22 [doi]
- An open-source and GUI-capable RISC-V computer system on a low-end FPGA boardKenji Kise. 23-30 [doi]
- A remote partial-reconfigurable SoC with a RISC-V soft processor targeting low-end FPGAsYuji Yamada, Nesrine Berjab, Tomohiro Yoneda, Kenji Kise. 31-37 [doi]
- Reinforcement Learning Enabled Multi-Layered NoC for Mixed Criticality SystemsNidhi Anantharajaiah, Fabian Lesniak, Tanja Harbaum, Jürgen Becker 0001. 38-44 [doi]
- A Energy-Efficient Re-configurable Multi-mode Convolution Neuron Network AcceleratorHuan-Ke Hsu, I-Chyn Wey, Tee Hui Teo. 45-50 [doi]
- A cost/power efficient storage system with directly connected FPGA and SATA disksRyohei Niwase, Hikaru Harasawa, Yoshiki Yamaguchi, Kaijie Wei, Hideharu Amano. 51-58 [doi]
- An Area-Efficient Coarse-Grained Reconfigurable Array Design for Approximate ComputingKaito Kutsuna, Takuya Kojima, Hideki Takase, Hiroshi Nakamura. 59-64 [doi]
- Design of The Ultra-Low-Power Driven VMM Configurations for μW Scale IoT DevicesKeisuke Takano, Takeaki Yajima, Satoshi Kawakami. 65-72 [doi]
- LCT-TL : Learning Classifier Table (LCT) with Transfer Learning for runtime SoC performance-power optimizationAnmol Surhonne, Florian Maurer 0003, Thomas Wild, Andreas Herkersdorf. 73-80 [doi]
- Overcoming Limited Data Challenges: Training Large-Scale Deduplication Models through Distributed and Non-Distributed MethodsShraddha Surana, Chinmay Dhawan, Digvijay Gunjal, Rajesh Tamhane. 81-88 [doi]
- OCA - Code Advisory Tool for OpenMP Parallelization of Sequential CodeGadi Haber, Shachaf Altman, Yosi Ben-Asher, Cfir Aguston. 89-96 [doi]
- Context-Aware Layer Scheduling for Seamless Neural Network Inference in Cloud-Edge SystemsMatthias Stammler, Vladimir Sidorenko, Fabian Kreß, Patrick Schmidt, Jürgen Becker 0001. 97-104 [doi]
- Patient Similarity using Electronic Health Records and Self-supervised LearningHong N. Dao, Incheon Paik. 105-110 [doi]
- Integrated 3D Active Noise Cancellation Simulation and Synthesis Platform Using TclSeunghyun Park, Daejin Park. 111-116 [doi]
- Enhancing Road Safety with Cloud-Integrated IoT Road Signal Detection SystemAntoine Hitayezu, Ritha Marie Umutoni, Emmanuel Tuyishime, Kayalvizhi Jayavel, Charles Kabiri. 117-122 [doi]
- SwinGaze: Egocentric Gaze Estimation with Video Swin TransformerYujie Li, Xinghe Wang, Zihang Ma, Yifu Wang, Michael Conrad Meyer. 123-127 [doi]
- An Efficient Bandit Learning for Matching based Distributed Task Offloading in Fog Computing NetworkHoa Tran-Dang, Dong-Seong Kim 0002. 128-133 [doi]
- IODnet: Indoor/Outdoor Telecommunication Signal Detection through Deep Neural NetworkMeisam Abdollahi, Sepideh Mashhadi, Ramin Sabzalizadeh, Alireza Mirzaei, Mohammad Elahi, Mohammad Baharloo, Amirali Baniasadi. 134-141 [doi]
- A novel fire monitoring system for electric bicycle shed based on YOLOv8Hongyang Zhong, Ziwen Wang, Zhiyi Chen, Wenhao Chen, Yujie Li. 142-147 [doi]
- Analysis of The Influence of Instagram Social Media Use on User's Consumptive BehaviorKevin Fernando Edlanda, Stanley Kent Purnama, Anderes Gui, Anwar Allah Pitchay. 148-153 [doi]
- A Convolutional Neural Network Inference Accelerator Design using Algorithmic Noise-Tolerance TechnologyShih-Yi Yang, I-Chyn Wey, Huan-Ke Hsu, Tee Hui Teo. 154-159 [doi]
- Evaluation Model for Current-Domain SRAM-based Computing-in-Memory CircuitsYiran Zhang, Bo Wang, Jinwu Chen, Xi Chen, Xin Si. 160-165 [doi]
- Convolutional Neural Networks Inference Accelerator Design using Selective Convolutional LayerTzu-Huan Huang, I-Chyn Wey, Emil Goh, Tee Hui Teo. 166-170 [doi]
- Efficient Resource-Aware Neural Architecture Search with a Neuro-Symbolic ApproachElena Bellodi, Davide Bertozzi, Alice Bizzarri, Michele Favalli, Michele Fraccaroli, Riccardo Zese. 171-178 [doi]
- Combining Decision Tree and Convolutional Neural Network for Energy Efficient On-Device Activity RecognitionMarius Brehler, Lucas Camphausen. 179-185 [doi]
- Reliability Estimation of ML for Image Perception: A Lightweight Nonlinear Transformation Approach Based on Full Reference Image Quality MetricsJoão-Vitor Zacchi, Francesco Carella, Priyank Upadhya, Shanza Ali Zafar, John Molloy, Lisa Jöckel, Janek Groß, Núria Mata, Nguyen Anh Vu Doan. 186-193 [doi]
- Graph structure and homophily for label propagation in Graph Neural NetworksMaxence Vandromme, Serge G. Petiton. 194-201 [doi]
- Iterative Refinement Quantum Amplitude EstimationYoshiyuki Saito, Ningyi Xie, Jungpil Shin 0001, Xinwei Lee, DongSheng Cai, Nobuyoshi Asai. 202-209 [doi]
- Runtime support for automatic placement of workloads on heterogeneous processorsNicolas Benoit, Stéphane Louise. 210-217 [doi]
- Board Allocation Algorithm for the Resource Management System of FiCTakumi Inage, Kensuke Iizuka, Hideharu Amano. 218-224 [doi]
- GRONA : A Framework for Gather-and-Reduce On Near-Memory AcceleratorsAman Sinha, Pei-Yi Liu, Yuhao Fang, Jhih-Yong Mai, Bo-Cheng Lai. 225-232 [doi]
- MAO: Memory Architecture ObfuscationSun Tanaka, Shinya Takamaeda-Yamazaki. 233-240 [doi]
- Dynamic Hand Gesture Recognition Using Effective Feature Extraction and Attention Based Deep Neural NetworkAbu Saleh Musa Miah, Jungpil Shin 0001, Md. Al Mehedi Hasan, Yuichi Okuyama 0001, Nobuyoshi Asai. 241-247 [doi]
- FPGA Accelerated Decentralized Reinforcement Learning for Anomaly Detection in UAV NetworksDylan Tocci, Ruolin Zhou, Kairui Zhang. 248-253 [doi]
- Generating Realistic Images with NeRF for Training of Autonomous Driving NetworkSugaya Shun, Yuichi Okuyama 0001, Shintomi Yuta, Kusano Ryota, Tanaka Kohsuke, Jungpil Shin 0001, Nishimura Satoshi. 254-261 [doi]
- A Lightweight Action Recognition Method for Deployable Embedded Devices for Human-Computer InteractionNanjie Hu, Ningyu Wang, Jie Lin, Qinghao Fu, Benying Tan. 262-267 [doi]
- A Near-Memory Dynamically Programmable Many-Core OverlayMahmoud Ahmed Elshimy, Veronia Iskandar, Diana Goehringer, Mohamed A. Abd El ghany. 268-275 [doi]
- A Low-Stall Methodology for an Interleaved Processor State ReplicationFabian Kempf, Julian Höfer, Tim Hotfilter, Jürgen Becker 0001. 276-283 [doi]
- Accelerating Graph-Based SLAM through Data Parallelism and Mixed Precision on FPGAsJunfeng Wu, Yuan He, Masaaki Kondo. 284-292 [doi]
- Lifetime Estimation for Core-Failure Resilient Multi-Core ProcessorsSudam Maduranga Wasala, Sobhan Niknam, Anuj Pathania, Clemens Grelck, Andy D. Pimentel. 293-300 [doi]
- Privacy-stealing Approach in Distributed IoMT SystemsHaoda Wang, Lingjun Zhao, Chen Qiu, Zhuotao Lian, Chunhua Su. 301-305 [doi]
- A Novel Supervised Distributed Dictionary Learning based on Learned K-SVD for Image DenoisingChaoran Zhang, Huakun Huang, Lingjun Zhao, Chenkai Xu, Rui Zhao. 306-311 [doi]
- Reentrancy Vulnerability Detection Based on Graph Convolutional Networks and Expert PatternsLongtao Guo, Huakun Huang, Sihun Xue, Peiliang Wang, Lingjun Zhao. 312-316 [doi]
- Understanding the Performance Impact of Queue-Based Resource Allocation in Scalable Disaggregated Memory SystemsAmit Puri, Abir Banerjee, John Jose, Tamarapalli Venkatesh. 317-324 [doi]
- PortBlocker: Detection and Mitigation of Hardware Trojan through Re-routing and BypassingSachin Bagga, Ruchika Gupta, John Jose. 325-331 [doi]
- Systematic Construction of Deadlock-Free Routing for NoC Using Integer Linear ProgrammingShuang Liu, Martin Radetzki. 332-339 [doi]
- Low-latency inter-domain communication on the Xen hypervisorFabian Lesniak, Tanja Harbaum, Jürgen Becker 0001. 340-346 [doi]
- Memory-efficient Edge-based Non-Neural Face Recognition Algorithm on the Parallel Ultra-Low Power (PULP) ClusterMitul Sudhirkumar Nagar, Sayantan Maiti, Rahul Kumar, Hiren Mewada, Pinalkumar Engineer. 347-353 [doi]
- Interlinked Chain Method for Blockchain-Based Collaborative Learning in Vehicular NetworksZhishang Wang, Khanh N. Dang, Abderazek Ben Abdallah. 354-359 [doi]
- Deep Learning-Driven Video Summarization on the Cloud: A Pathway to Efficient Storage and Quick AccessMahmoud Darwich, Kasem Khalil, Yasser Ismail, Magdy A. Bayoumi. 360-365 [doi]
- Automatic Text Classification as Relevance Measure for Russian School Physics TextsElijah Tomin, Marina Solnyshkina, Elzara Gafiyatova, Albina Galiakhmetova. 366-370 [doi]
- Enhancing Deep Reinforcement Learning with Compressed Sensing-based State EstimationShaswot Shresthamali, Masaaki Kondo. 371-378 [doi]
- Design of a Nonvolatile-Neural-Network-Accelerator-Embedded Edge-IoT Device and Its Hardware EmulationKen Sato, Daisuke Suzuki. 379-385 [doi]
- Delay-optimized Topology Management of a Wirelessly Networked Disaster AreaMichael Conrad Meyer, Yu Wang 0064. 386-391 [doi]
- A Novel Yield Improvement Approach for 3D Stacking Neuromorphic ArchitectureNgo-Doanh Nguyen, Khanh N. Dang. 392-398 [doi]
- Fault-Tolerant Ensemble CNNs Increasing Diversity Based on Knowledge DistillationShunsuke Koeda, Yoichi Tomioka, Hiroshi Saito. 399-405 [doi]
- Distributed Data Logger Based on Dual-Core MCU in Motor DriveDuc M. Tran, Joon-Young Choi. 406-410 [doi]
- A Scalable JPEG Encoder on a Many-Core ArrayThomas Abbott, Bevan M. Baas. 411-418 [doi]
- Universal 32/64-bit CGRA for Lightweight Cryptography in Securing IoT Data TransmissionThi Sang Duong, Hoai Luan Pham, Vu Trung Duong Le, Thi Diem Tran, Ren Imamura, Quoc Duy Nam Nguyen, Thi Hong Tran, Yasuhiko Nakashima. 419-425 [doi]
- Modelling and Impact Analysis of Push Back Attack in 3D Bufferless Network on ChipV. R. Josna, Rose George Kunthara, Rekha K. James, John Jose. 426-432 [doi]
- Autonomous Driving Robot Using FPGA and BNN with Random ForestYasuyuki Suzuki, Shogo Semba, Yoichi Tomioka, Hiroshi Saito. 433-440 [doi]
- Implementation of Physics Informed Neural Networks on Edge DeviceXuezhi Zhang, I-Chyn Wey, Maoyang Xiang, Tee Hui Teo. 441-445 [doi]
- A Many-core Architecture for an Ensemble Ternary Neural Network Toward High-Throughput InferenceRyota Kayanoma, Akira Jinguji, Hiroki Nakahara. 446-453 [doi]
- Selective Pruning of Sparsity-Supported Energy-Efficient Accelerator for Convolutional Neural NetworksChia-Chi Liu, I-Chyn Wey, Xuezhi Zhang, Tee Hui Teo. 454-461 [doi]
- First steps towards micro-benchmarking the Lava-Loihi neuromorphic ecosystemWalter Gallego Gomez, Andrea Pignata, Riccardo Pignari, Vittorio Fra, Enrico Macii, Gianvito Urgese. 462-469 [doi]
- Review of open neuromorphic architectures and a first integration in the RISC-V PULP platformMichelangelo Barocci, Vittorio Fra, Enrico Macii, Gianvito Urgese. 470-477 [doi]
- A Highly Accurate and Parallel Vision MLP FPGA Accelerator based on FP7/8 SIMD OperationsMari Yasunaga, Junnosuke Suzuki, Masato Watanabe, Kazushi Kawamura, Thiem Van Chu, Jaehoon Yu, Masato Motomura. 478-485 [doi]
- TensorRT Implementations of Model Quantization on Edge SoCYuxiao Zhou, Zhishan Guo, Zheng Dong 0002, Kecheng Yang 0001. 486-493 [doi]
- Low-cost Low-Power Implementation of Binary Edwards Curve for Secure Passive RFID TagsHiep Manh Dao, Vincent Beroulle, Yann Kieffer, Xuan-Tu Tran, Duy-Hieu Bui. 494-500 [doi]
- Mitigating Test-Induced Yield-Loss by IR-Drop-Aware X-FillingShiling Shi, Stefan Holst, Xiaoqing Wen. 501-507 [doi]
- Modelling Peripheral Designs using FSM-like Notation for Complete Property Set GenerationEndri Kaja, Nicolas Gerlin, Robert Kunzelmann, Keerthikumara Devarajegowda, Wolfgang Ecker. 508-515 [doi]
- Novel March WY Approach for Dynamic Fault Detection in Memory BISTLoh Wan Ying, Weng Fook Lee, Razaidi Hussin, Aiman Zakwan Jidin, Norhawati Ahmad, Nor Azura Zakaria. 516-521 [doi]
- GeMP-BNN: High-Performance Sampling-Free Bayesian Neural Network Accelerator with Gaussian Error Moment PropagationYuki Hirayama, Kengo Suga, Shinya Takamaeda-Yamazaki. 522-529 [doi]
- Recursive Algorithm FIR Filter Quantization and Low-Cost Structure Optimization Design Based on MATLAB and SimulinkZixia Shang. 530-535 [doi]
- Exploring Discriminability of Categorical Anchors for Heterogeneous Domain AdaptationYan Song, Junchu Huang. 537-543 [doi]
- Appropriate Graph-Algorithm Selection for Edge Devices Using Machine LearningYusuke Fukasawa, Kazuhiko Komatsu, Masayuki Sato 0001, Hiroaki Kobayashi. 544-551 [doi]
- Using Multiple Clocks in Highlevel Synthesis to overcome unbalanced clock cyclesYosi Ben-Asher, Ibrahim Qashqoush. 552-559 [doi]
- Enhancing Anonymity in NoC Communication to Counter Traffic Profiling by Hardware TrojansSyam Sankar, John Jose, Ruchika Gupta, Sukumar Nandi. 560-567 [doi]
- Parallel Verification in RISC-V Secure BootAkihiro Saiki, Yu Omori, Keiji Kimura. 568-575 [doi]
- High-efficiency Reconfigurable Crypto Accelerator Utilizing Innovative Resource Sharing and Parallel ProcessingVu Trung Duong Le, Hoai Luan Pham, Thi Hong Tran, Thi Sang Duong, Yasuhiko Nakashima. 576-583 [doi]
- Scale Up while Scaling Out Microservices in Video Analytics PipelinesPriscilla Benedetti, Giuseppe Coviello, Kunal Rao, Srimat Chakradhar. 584-591 [doi]
- Performance of precision auto-tuned neural networksQuentin Ferro, Stef Graillat, Thibault Hilaire, Fabienne Jézéquel. 592-599 [doi]
- A Constraint Partition Method for Combinatorial Optimization ProblemsMakoto Onoda, Kazuhiko Komatsu, Masahito Kumagai, Masayuki Sato 0001, Hiroaki Kobayashi. 600-607 [doi]
- Sparse Matrix-Vector Multiplication with Reduced-Precision Memory AccessorDaichi Mukunoki, Masatoshi Kawai, Toshiyuki Imamura. 608-615 [doi]