Statistical Reliability Estimation of Microprocessor-Based Systems Introduction
An introduction to the IEEE Transactions on Computers article, "Statistical Reliability Estimation of Microprocessor-based Systems". Also available here: ...
ieeeComputerSociety
PETCAM — A Power Efficient TCAM Architecture For Forwarding Tables: Video extra
In this video, coauthor Tania Banerjee-Mishra gives an overview of Ternary Content Addressable Memory and explains how the PETCAM approach improves ...
ieeeComputerSociety
A Compositional Approach for Verifying Protocols Running on On-Chip Networks (0718) Chinese
In modern many-core architectures, advanced on-chip networks provide the means of communication for the cores. This greatly complicates the design and ...
ieeeComputerSociety
2.2 Process Synchronization, Priority Inheritance | Real-Time Systems 即時系統 | Tei-Wei Kuo 郭大維
Lecturer: Prof. Tei-Wei Kuo http://www.csie.ntu.edu.tw/~ktw/eng-index.htm Papers for discussions: L. Sha, R. Rajkumar, J.P. Lehoczky, “Priority Inheritance ...
郭大維Tei-Wei Kuo
Special Section on Computer Arithmetic in IEEE TC
Call for papers for the special section on Computer Arithmetic in IEEE Transactions on Computers.
edwardDTU
Concurrent On-Line Testing and Error/Fault Resilience of Digital Systems
Guest editor Cecilia Metra discusses the "Concurrent On-Line Testing and Error/Fault Resilience of Digital Systems" theme issue for IEEE Transactions on ...
ieeeComputerSociety
Static Instruction Scheduling for High Performance on Limited Hardware (0518)
Complex out-of-order (OoO) processors have been designed to overcome the restrictions of outstanding long-latency misses at the cost of increased energy ...
ieeeComputerSociety
Augmented Reading: Conclusions
In this video, author Paolo Montuschi summarizes the key concepts of the article "Augmented Reading: The Present and Future of Electronic Scientific ...
ieeeComputerSociety
Deadlock Verification of Cache Coherence Protocols and Communication Fabrics
Cache coherence plays a major role in manycore systems. The verification of deadlocks is a challenge in particular, because deadlock freedom is an emerging ...
ieeeComputerSociety
Hybrid Obfuscation to Protect Against Disclosure Attacks on Embedded Microprocessors Spanish (0318)
The risk of code reverse-engineering is particularly acute for embedded processors which often have limited available resources to protect program information.
ieeeComputerSociety
Utilization Aware Power Management in Reliable and Aggressive Chip Multi Processors - March Chinese
With increasing transistor density on a single chip, processor design in the nanoscale era is hitting power and frequency walls. Due to these challenges, ...
ieeeComputerSociety
SPACE: Semi-Partitioned CachE for Energy Efficient, Hard Real-Time Systems Spanish 0417
Abstract—Multi-core processors are increasingly popular because they yield higher performance, but they also present new challenges for hard real-time ...
ieeeComputerSociety
Energy-Aware Adaptive Restore Schemes for MLC STT-RAM Cache (0517)-Chinese
For the sake of higher cell density while achieving near-zero standby power, recent research progress in Magnetic Tunneling Junction (MTJ) devices has ...
ieeeComputerSociety
Efficient Detection for Malicious and Random Errors in Additive Encrypted Computation Spanish (0118)
Although data confidentiality is the primary security objective in additive encrypted computation applications, such as the aggregation of encrypted votes in ...
ieeeComputerSociety
Progressive Congestion Management Based on Packet Marking and Validation Techniques
Congestion management in multistage interconnection networks is a serious problem not completely solved. In order to avoid the degradation of network ...
ieeeComputerSociety
Efficient Detection for Malicious and Random Errors in Additive Encrypted Computation Chinese (0118)
Although data confidentiality is the primary security objective in additive encrypted computation applications, such as the aggregation of encrypted votes in ...
ieeeComputerSociety
Parallel Reproducible Summation
Reproducibility, i.e. getting bitwise identical floating point results from multiple runs of the same program, is a property that many users depend on either for ...
ieeeComputerSociety
Bulletproofs: Short Proofs for Confidential Transactions and More
Bulletproofs: Short Proofs for Confidential Transactions and More Benedikt Bünz (Stanford University) Presented at the 2018 IEEE Symposium on Security ...
IEEE Symposium on Security and Privacy
Everything You Need to Know About 5G
Millimeter waves, massive MIMO, full duplex, beamforming, and small cells are just a few of the technologies that could enable ultrafast 5G networks.
IEEE Spectrum
Linear Branch Entropy: Characterizing and Optimizing Branch Behavior...0317 Spanish
In this paper, we propose linear branch entropy, a new metric for characterizing branch behavior. Linear branch entropy is independent of the configuration of a ...
ieeeComputerSociety
Enabling Energy-Efficient and Reliable Neural Network via Neuron-Level Voltage Scaling Chinese
With the platforms of running deep neural networks (DNNs) move from large-scale data centers to handheld devices, power emerge as one of the most ...
ieeeComputerSociety
Deadlock Verification of Cache Coherence Protocols and Communication Fabrics 0217 Chinese
Cache coherence plays a major role in manycore systems. The verification of deadlocks is a challenge in particular, because deadlock freedom is an emerging ...
ieeeComputerSociety
A Light-Weight White-Box Encryption Scheme for Securing Distributed Embedded Devices 1019
Distributed embedded devices are widely used in sensor networks and the Internet of Things for gathering and sending data. Many of them are deployed in an ...
ieeeComputerSociety
Cloud Computing: Drivers & Risks
Cloud computing overview, including SaaS, PaaS and IaaS delivery models, market size, cloud AI services (AIaaS and RaaS), cost and broader digital ...
ExplainingComputers
The Rise Of Open-Source Software
Open-source software powers nearly all the world's major companies. This software is freely available, and is developed collaboratively, maintained by a broad ...
CNBC
A Light-Weight White-Box Encryption Scheme for Securing Distributed Embedded Devices (Chinese) 1019
Distributed embedded devices are widely used in sensor networks and the Internet of Things for gathering and sending data. Many of them are deployed in an ...
ieeeComputerSociety
Utility Functions and Resource Management in an Oversubscribed Heterogeneous Computing Environment
We model an oversubscribed heterogeneous computing system where tasks arrive dynamically and a scheduler maps the tasks to machines for execution.
ieeeComputerSociety
Opportunistic Mobile Networks- Part- III
Wireless Ad Hoc and Sensor Networks
The Decline of IBM
This video is meant to be a documentary to be enjoyed in one or more sittings. The question answered is: Why did International Business Machines decline?
The Market is Open
MPPA + Autoware on eMCOS: Localization of Self-driving software on Embedded Many Cores
In test course with a real car, steering, accelerator, and brake are automatically controlled based on the results of KALRAY MPPA-256, a NoC-based embedded ...
OsakaUniv EmbIV
Lec 23: How to Explore Computer Architecture?
Advanced Computer Architecture Course URL: https://swayam.gov.in/nd1_noc19_cs62/... Prof. John Jose Dept of Computer Science & Engineering IIT ...
NPTEL IIT Guwahati
ID2S Password Authenticated Key Exchange Protocols
2016 IEEE Transactions on Computers, For More Details::Contact::K.Manjunath - 09535866270 http://www.tmksinfotech.com and ...
manju nath
IEEE CIS "How to publish your research": Kay Chen Tan
Location: IEEE Congress on Evolutionary Computation 2013 (http://www.cec2013.org/) Panel Discussion "How to publish your research", June 21, 4-6pm Chair: ...
CIS Cyprus
An Error-Detection and Self-Repairing Method for Dynamically...(0617 Spanish)
Abstract—Reconfigurable systems are gaining an increasing interest in the domain of safety-critical applications, for example in the space and avionic domains.
ieeeComputerSociety
High Performance Parallel Decimal Multipliers Using Hybrid BCD Codes 1217
A parallel decimal multiplier with improved performance is proposed in this paper by exploiting the properties of three different binary coded decimal (BCD) ...
ieeeComputerSociety
IEEE CIS "How to publish your research": Garrison Greenwood
Location: IEEE Congress on Evolutionary Computation 2013 (http://www.cec2013.org/) Panel Discussion "How to publish your research", June 21, 4-6pm Chair: ...
CIS Cyprus
Wi-Fi IEEE 802.11 Standard wlan data communication lecture for GATE Computer Science wifi
These videos are useful for examinations like NTA UGC NET Computer Science and Applications, GATE Computer Science, ISRO, DRDO, Placements, etc.
NTA UGC NET Computer Science CSE
Cloudlets Activation Scheme for Scalable Mobile Edge Computing with Transmission Power Control...
Mobile devices have several restrictions due to design choices that guarantee their mobility. A way of surpassing such limitations is to utilize cloud servers called ...
ieeeComputerSociety
How to use the Encyclopaedia of Forms & Precedents
This is for students of Temasek Polytechnic who have access to the Library website http://spark.tp.edu.sg.
Benjamin Ang
Extending Unix Pipelines to DAGs (0917)
The Unix shell dgsh provides an expressive way to construct sophisticated and efficient non-linear pipelines. Such pipelines 4 can use standard Unix tools, ...
ieeeComputerSociety
ما مقدار مشاركة العرب في صناعة التكنلوجيا الحديثة؟
ما مقدار مشاركة العرب في صناعة التكنلوجيا الحديثة؟
مدينة العلم