![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 143 matches
- 2019
- Sukarn Agarwal
, Hemangee K. Kapoor:
Improving the Lifetime of Non-Volatile Cache by Write Restriction. IEEE Trans. Computers 68(9): 1297-1312 (2019) - Amogh Agrawal
, Aayush Ankit
, Kaushik Roy:
SPARE: Spiking Neural Network Acceleration Using ROM-Embedded RAMs as In-Memory-Computation Primitives. IEEE Trans. Computers 68(8): 1190-1200 (2019) - Allyson Bonetti França
, Danilo Leal Maciel, José Marques Soares
, Giovanni Cordeiro Barroso:
Sherlock N-overlap: Invasive Normalization and Overlap Coefficient for the Similarity Analysis Between Source Code. IEEE Trans. Computers 68(5): 740-751 (2019) - Hussam Amrouch
, Seyed Borna Ehsani
, Andreas Gerstlauer
, Jörg Henkel:
On the Efficiency of Voltage Overscaling under Temperature and Aging Effects. IEEE Trans. Computers 68(11): 1647-1662 (2019) - Subho S. Banerjee
, Mohamed El-Hadedy, Jong Bin Lim, Zbigniew T. Kalbarczyk, Deming Chen, Steven S. Lumetta, Ravishankar K. Iyer
:
ASAP: Accelerated Short-Read Alignment on Programmable Hardware. IEEE Trans. Computers 68(3): 331-346 (2019) - Rima Bellal
, El-sedik Lamini
, Hacène Belbachir, Samir Tagzout, Adel Belouchrani:
Improved Affine Arithmetic-Based Precision Analysis for Polynomial Function Evaluation. IEEE Trans. Computers 68(5): 702-712 (2019) - El Mehdi Benhani, Lilian Bossuet
, Alain Aubert:
The Security of ARM TrustZone in a FPGA-Based SoC. IEEE Trans. Computers 68(8): 1238-1248 (2019) - Anna Bernasconi
, Valentina Ciriani
, Gabriella Trucco
, Tiziano Villa
:
Boolean Minimization of Projected Sums of Products via Boolean Relations. IEEE Trans. Computers 68(9): 1269-1282 (2019) - Gautier Berthou
, Tristan Delizy
, Kevin Marquet, Tanguy Risset
, Guillaume Salagnac
:
Sytare: A Lightweight Kernel for NVRAM-Based Transiently-Powered Systems. IEEE Trans. Computers 68(9): 1390-1403 (2019) - Joppe W. Bos
, Simon Friedberger
:
Arithmetic Considerations for Isogeny-Based Cryptography. IEEE Trans. Computers 68(7): 979-990 (2019) - Javier D. Bruguera, Florent de Dinechin
:
Guest Editors Introduction: Special Section on Computer Arithmetic. IEEE Trans. Computers 68(7): 951-952 (2019) - Neil Burgess
, Christopher E. Goodyer
, Christopher Neal Hinds
, David Raymond Lutz
:
High-Precision Anchored Accumulators for Reproducible Floating-Point Summation. IEEE Trans. Computers 68(7): 967-978 (2019) - Francisco Candel
, Alejandro Valero
, Salvador Petit
, Julio Sahuquillo
:
Efficient Management of Cache Accesses to Boost GPGPU Memory Subsystem Performance. IEEE Trans. Computers 68(10): 1442-1454 (2019) - Yuhai Cao
, Chao Li
, Jing Wang
, Weigong Zhang, Quan Chen
, Jingwen Leng, Bin Yao
, Yao Shen, Minyi Guo
:
DR Refresh: Releasing DRAM Potential by Enabling Read Accesses Under Refresh. IEEE Trans. Computers 68(11): 1584-1596 (2019) - Daniel Casini
, Alessandro Biondi
, Giorgio C. Buttazzo:
Handling Transients of Dynamic Real-Time Workload Under EDF Scheduling. IEEE Trans. Computers 68(6): 820-835 (2019) - Yuan-Hao Chang, Jingtong Hu, Mehdi Baradaran Tahoori, Ronald F. DeMara
:
Guest Editorial: IEEE Transactions on Computers Special Section on Emerging Non-Volatile Memory Technologies: From Devices to Architectures and Systems. IEEE Trans. Computers 68(8): 1111-1113 (2019) - Ke Chen
, Linbin Chen, Pedro Reviriego
, Fabrizio Lombardi
:
Efficient Implementations of Reduced Precision Redundancy (RPR) Multiply and Accumulate (MAC). IEEE Trans. Computers 68(5): 784-790 (2019) - Youmin Chen
, Youyou Lu
, Pei Chen, Jiwu Shu:
Efficient and Consistent NVMM Cache for SSD-Based File System. IEEE Trans. Computers 68(8): 1147-1158 (2019) - Hsing Min Chen
, Shin-Ying Lee
, Trevor N. Mudge, Carole-Jean Wu
, Chaitali Chakrabarti:
Configurable-ECC: Architecting a Flexible ECC Scheme to Support Different Sized Accesses in High Bandwidth Memory Systems. IEEE Trans. Computers 68(5): 646-659 (2019) - Xubin Chen
, Yin Li, Tong Zhang:
Reducing Flash Memory Write Traffic by Exploiting a Few MBs of Capacitor-Powered Write Buffer Inside Solid-State Drives (SSDs). IEEE Trans. Computers 68(3): 426-439 (2019) - Xi Cheng
, Min Zhou
, Xiaoyu Song, Ming Gu, Jiaguang Sun:
Tolerating C Integer Error via Precision Elevation. IEEE Trans. Computers 68(2): 270-286 (2019) - Elham Cheshmikhani
, Hamed Farbeh
, Seyed Ghassem Miremadi
, Hossein Asadi
:
TA-LRW: A Replacement Policy for Error Rate Reduction in STT-MRAM Caches. IEEE Trans. Computers 68(3): 455-470 (2019) - Jungwhan Choi
, Jaemin Jang, Lee-Sup Kim
:
DC-PCM: Mitigating PCM Write Disturbance with Low Performance Overhead by Using Detection Cells. IEEE Trans. Computers 68(12): 1741-1754 (2019) - Jérôme Courtois, Lokman A. Abbas-Turki, Jean-Claude Bajard
:
Resilience of Randomized RNS Arithmetic with Respect to Side-Channel Leaks of Cryptographic Computation. IEEE Trans. Computers 68(12): 1720-1730 (2019) - Guohao Dai
, Tianhao Huang, Yu Wang
, Huazhong Yang
, John Wawrzynek:
HyVE: Hybrid Vertex-Edge Memory Hierarchy for Energy-Efficient Graph Processing. IEEE Trans. Computers 68(8): 1131-1146 (2019) - Xiaoliang Dai
, Hongxu Yin
, Niraj K. Jha
:
NeST: A Neural Network Synthesis Tool Based on a Grow-and-Prune Paradigm. IEEE Trans. Computers 68(10): 1487-1497 (2019) - Yejia Di
, Liang Shi
, Congming Gao, Qiao Li
, Chun Jason Xue, Kaijie Wu
:
Minimizing Retention Induced Refresh Through Exploiting Process Variation of Flash Memory. IEEE Trans. Computers 68(1): 83-98 (2019) - Sunil Dutt
, Satyabrata Dash
, Sukumar Nandi
, Gaurav Trivedi
:
Analysis, Modeling and Optimization of Equal Segment Based Approximate Adders. IEEE Trans. Computers 68(3): 314-330 (2019) - Nicolas Fabiano
, Jean-Michel Muller
, Joris Picot
:
Algorithms for Triple-Word Arithmetic. IEEE Trans. Computers 68(11): 1573-1583 (2019) - Zubair Md. Fadlullah
, Bomin Mao
, Fengxiao Tang
, Nei Kato
:
Value Iteration Architecture Based Deep Learning for Intelligent Routing Exploiting Heterogeneous Computing Platforms. IEEE Trans. Computers 68(6): 939-950 (2019)
skipping 113 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-07 07:38 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint