Stop the war!
Остановите войну!
for scientists:
default search action
ACM Transactions on Embedded Computing Systems, Volume 23
Volume 23, Number 1, January 2024
- Daniel Casini, Dakshina Dasari, Matthias Becker, Giorgio C. Buttazzo:
Introduction to the Special Issue on Real-Time Computing in the IoT-to-Edge-to-Cloud Continuum. 1:1-1:2 - Ying Chen, Jie Zhao, Jintao Hu, Shaohua Wan, Jiwei Huang:
Distributed Task Offloading and Resource Purchasing in NOMA-Enabled Mobile Edge Computing: Hierarchical Game Theoretical Approaches. 2:1-2:28 - Tommaso Cucinotta, Alexandre M. Amory, Gabriele Ara, Francesco Paladino, Marco Di Natale:
Multi-criteria Optimization of Real-time DAGs on Heterogeneous Platforms under P-EDF. 3:1-3:35 - Václav Struhár, Silviu S. Craciunas, Mohammad Ashjaei, Moris Behnam, Alessandro V. Papadopoulos:
Hierarchical Resource Orchestration Framework for Real-time Containers. 4:1-4:24 - Marco Barletta, Marcello Cinque, Luigi De Simone, Raffaele Della Corte:
Criticality-aware Monitoring and Orchestration for Containerized Industry 4.0 Environments. 5:1-5:28 - Soumendu Kumar Ghosh, Arnab Raha, Vijay Raghunathan, Anand Raghunathan:
PArtNNer: Platform-Agnostic Adaptive Edge-Cloud DNN Partitioning for Minimizing End-to-End Latency. 6:1-6:38 - Haitao Xu, Saiyu Qi, Yong Qi, Wei Wei, Naixue Xiong:
Secure and Lightweight Blockchain-based Truthful Data Trading for Real-Time Vehicular Crowdsensing. 7:1-7:31 - Pratham Oza, Nathaniel Hudson, Thidapat Chantem, Hana Khamfroush:
Deadline-Aware Task Offloading for Vehicular Edge Computing Networks Using Traffic Light Data. 8:1-8:25 - Miguel Gutiérrez Gaitán, Luís Almeida, Pedro M. d'Orey, Pedro M. Santos, Thomas Watteyne:
Minimal-Overlap Centrality for Multi-Gateway Designation in Real-Time TSCH Networks. 9:1-9:17
- Vishnuvardhan V. Iyer, Aditya Thimmaiah, Michael Orshansky, Andreas Gerstlauer, Ali E. Yilmaz:
A Hierarchical Classification Method for High-accuracy Instruction Disassembly with Near-field EM Measurements. 10:1-10:21 - Yiwen Zhang, Hui Zheng, Zonghua Gu:
Energy-Aware Adaptive Mixed-Criticality Scheduling with Semi-Clairvoyance and Graceful Degradation. 11:1-11:20 - Aritra Bagchi, Dinesh Joshi, Preeti Ranjan Panda:
COBRRA: COntention-aware cache Bypass with Request-Response Arbitration. 12:1-12:30 - Yong-Jun Shin, Donghwan Shin, Doo-Hwan Bae:
Virtual Environment Model Generation for CPS Goal Verification using Imitation Learning. 13:1-13:29 - Wangyang Yu, Jinming Kong, Zhijun Ding, Xiaojun Zhai, Zhiqiang Li, Qi Guo:
Modeling and Analysis of ETC Control System with Colored Petri Net and Dynamic Slicing. 14:1-14:27 - Zhijian He, Bohuan Xue, Xiangcheng Hu, Zhaoyan Shen, Xiangyue Zeng, Ming Liu:
Robust Embedded Autonomous Driving Positioning System Fusing LiDAR and Inertial Sensors. 15:1-15:26 - Huamei Qi, Fang Ren, Leilei Wang, Ping Jiang, Shaohua Wan, Xiaoheng Deng:
Multi-Compression Scale DNN Inference Acceleration based on Cloud-Edge-End Collaboration. 16:1-16:25
Volume 23, Number 2, March 2024
- Zhiqiang Que, Hongxiang Fan, Marcus Loo, He Li, Michaela Blott, Maurizio Pierini, Alexander D. Tapper, Wayne Luk:
LL-GNN: Low Latency Graph Neural Networks on FPGAs for High Energy Physics. 17:1-17:28 - Arwa Alsubhi, Simeon Babatunde, Nicole Tobias, Jacob Sorber:
Stash: Flexible Energy Storage for Intermittent Sensors. 18:1-18:23 - Liang Zhao, Hongxuan Li, Enchao Zhang, Ammar Hawbani, Mingwei Lin, Shaohua Wan, Mohsen Guizani:
Intelligent Caching for Vehicular Dew Computing in Poor Network Connectivity Environments. 19:1-19:24 - Ramesh Kumar Sah, Hassan Ghasemzadeh:
Adversarial Transferability in Embedded Sensor Systems: An Activity Recognition Perspective. 20:1-20:31 - George Kornaros, Svoronos Leivadaros, Filippos-George Kolimbianakis:
Flexible Updating of Internet of Things Computing Functions through Optimizing Dynamic Partial Reconfiguration. 21:1-21:25 - Wael Fatnassi, Yasser Shoukry:
PolyARBerNN: A Neural Network Guided Solver and Optimizer for Bounded Polynomial Inequalities. 22:1-22:26 - Lu Li, Qi Tian, Guofeng Qin, Shuaiyu Chen, Weijia Wang:
Compact Instruction Set Extensions for Dilithium. 23:1-23:21 - Chin-Hsien Wu, Cheng-Tze Lee, Yi-Ren Tsai, Cheng-Yen Wu:
A Space-Grained Cleaning Method to Reduce Long-Tail Latency of DM-SMR Disks. 24:1-24:24 - Jianing Deng, Shunjie Dong, Lvcheng Chen, Jingtong Hu, Cheng Zhuo:
STDF: Spatio-Temporal Deformable Fusion for Video Quality Enhancement on Embedded Platforms. 25:1-25:25
- Shivam Bhasin, Fabrizio De Santis, Francesco Regazzoni:
Special Issue on Post-Quantum Cryptography for Embedded Systems. 26:1-26:3 - Catinca Mujdei, Lennert Wouters, Angshuman Karmakar, Arthur Beckers, Jose Maria Bermudo Mera, Ingrid Verbauwhede:
Side-channel Analysis of Lattice-based Post-quantum Cryptography: Exploiting Polynomial Multiplication. 27:1-27:23 - Saransh Gupta, Rosario Cammarota, Tajana Simunic:
MemFHE: End-to-end Computing with Fully Homomorphic Encryption in Memory. 28:1-28:23 - Jan Philipp Thoma, Darius Hartlief, Tim Güneysu:
Agile Acceleration of Stateful Hash-based Signatures in Hardware. 29:1-29:29 - Patrick Karl, Jonas Schupp, Tim Fritzmann, Georg Sigl:
Post-Quantum Signatures on RISC-V with Hardware Acceleration. 30:1-30:23 - Rami Elkhatib, Brian Koziel, Reza Azarderakhsh, Mehran Mozaffari Kermani:
Cryptographic Engineering a Fast and Efficient SIKE in FPGA. 31:1-31:25 - Richa Singh, Saad Islam, Berk Sunar, Patrick Schaumont:
Analysis of EM Fault Injection on Bit-sliced Number Theoretic Transform Software in Dilithium. 32:1-32:27 - Arpan Jati, Naina Gupta, Anupam Chattopadhyay, Somitra Kumar Sanadhya:
A Configurable CRYSTALS-Kyber Hardware Implementation with Side-Channel Protection. 33:1-33:25 - Nouri Alnahawi, Nicolai Schmitt, Alexander Wiesmaier, Chiara-Marie Zok:
Toward Next Generation Quantum-Safe eIDs and eMRTDs: A Survey. 34:1-34:28 - Prasanna Ravi, Anupam Chattopadhyay, Jan-Pieter D'Anvers, Anubhab Baksi:
Side-channel and Fault-injection attacks over Lattice-based Post-quantum Schemes (Kyber, Dilithium): Survey and New Results. 35:1-35:54
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.