IEEE CIS "How to publish your research": Garrison Greenwood
Location: IEEE Congress on Evolutionary Computation 2013 (http://www.cec2013.org/) Panel Discussion "How to publish your research", June 21, 4-6pm Chair: ...
CIS Cyprus
2.3 The Design of Real-Time Programming Systems Based on Process Models
Lecturer: Prof. Tei-Wei Kuo http://www.csie.ntu.edu.tw/~ktw/eng-index.htm Papers for discussions: A.K. Mok, “The Design of Real-Time Programming Systems ...
郭大維Tei-Wei Kuo
IEEE CIS "How to publish your research": Kay Chen Tan
Location: IEEE Congress on Evolutionary Computation 2013 (http://www.cec2013.org/) Panel Discussion "How to publish your research", June 21, 4-6pm Chair: ...
CIS Cyprus
IEEE Transactions on Intelligent Transportation Systems
Simulation results of a publication entitled Time-Optimal Maneuver Planning in Automatic Parallel Parking Using a Simultaneous Dynamic Optimization ...
柏李
Publishing your research, by Marios Polycarpou
5th Cyprus Workshop on Signal Processing and Informatics (CWSPI) University of Cyprus, Nicosia, Cyprus July 10, 2012 *** Due to a technical problem this ...
Demetrios Eliades
PETCAM — A Power Efficient TCAM Architecture For Forwarding Tables: Video extra
In this video, coauthor Tania Banerjee-Mishra gives an overview of Ternary Content Addressable Memory and explains how the PETCAM approach improves ...
ieeeComputerSociety
IEEE – TRANSACTIONS ON ANDROID
Final Year Students Project for IEEE Application Project||Embedded||Civil||Mechanical||Electronic Communication.
Raman Saravanan
Revisiting Vulnerability Analysis in Modern Microprocessors
The notion of Architectural Vulnerability Factor (AVF) has been extensively used to evaluate various aspects of design robustness. While AVF has been a very ...
ieeeComputerSociety
Polysynchronous Clocking: Exploiting the 2 Skew Tolerance of Stochastic Circuits Spanish 1017
In the paradigm of stochastic computing, arithmetic functions are computed on randomized bit streams. The method 6 naturally and effectively tolerates very high ...
ieeeComputerSociety
Generation of Models for Wireless Sensor Network Assessment
Authors Domenico Cotroneo, Catello Di Martino, and Marcello Cinque discuss the use of wireless sensor networks for building the next generation of critical ...
ieeeComputerSociety
Bubble Budgeting: Throughput Optimization for Dynamic Workloads by Exploiting Dark Cores...(Chinese)
All the cores of a many-core chip cannot be active at the same time, due to reasons like low CPU utilization in server systems and limited power budget in dark ...
ieeeComputerSociety
Thermal Safe Power (TSP): Efficient Power Budgeting for Heterogeneous Manicure...0117 Spanish
Chip manufacturers provide the Thermal Design Power (TDP) for a specific chip. The cooling solution is designed to dissipate this power level. But because TDP ...
ieeeComputerSociety
Enhancing Energy Efficiency of Multimedia Applications in Heterogeneous Mobile...Spanish (1117)
Abstract—Recent smart devices have adopted heterogeneous multi-core processors which have high-performance big cores and 6 low-power small cores.
ieeeComputerSociety
Deadlock Verification of Cache Coherence Protocols and Communication Fabrics
Cache coherence plays a major role in manycore systems. The verification of deadlocks is a challenge in particular, because deadlock freedom is an emerging ...
ieeeComputerSociety
Analytical Fault Tolerance Assessment and Metrics for TSV-Based 3D Network-on-Chip-Chinese
Reliability is one of the most challenging problems in the context of three-dimensional network-on-chip (3D NoC) systems. Reliability analysis is prominent for ...
ieeeComputerSociety
Hybrid Obfuscation to Protect Against Disclosure Attacks on Embedded Microprocessors Spanish (0318)
The risk of code reverse-engineering is particularly acute for embedded processors which often have limited available resources to protect program information.
ieeeComputerSociety
Configurable XOR Hash Functions for Banked Scratchpad Memories in GPUs (0716 Chinese)
Scratchpad memories in GPU architectures are employed as software-controlled caches to increase the effective GPU memory bandwidth. Through the use of ...
ieeeComputerSociety
Loss-Aware Switch Design and Non-Blocking Detection Algorithm for Intra-Chip Scale... Chinese 0616
As the number of on-chip processor cores increases, power-efficient solutions are sought for data communication between cores. The Helix-h non-blocking ...
ieeeComputerSociety
Utilization Aware Power Management in Reliable and Aggressive Chip Multi Processors - March Chinese
With increasing transistor density on a single chip, processor design in the nanoscale era is hitting power and frequency walls. Due to these challenges, ...
ieeeComputerSociety
Deadlock Verification of Cache Coherence Protocols and Communication Fabrics 0217 Chinese
Cache coherence plays a major role in manycore systems. The verification of deadlocks is a challenge in particular, because deadlock freedom is an emerging ...
ieeeComputerSociety
Security and Privacy of Machine Learning Systems
Biography: Sandip Kundu is a Program Director at the National Science Foundation in the CNS division within the CISE directorate. He is serving in this position ...
IEEE VTS UnB
IEEE TRANSACTION ON SECURITY TOPICS 2017
IEEE Information security projects 2017 for Final Year Students Information security, sometimes shortened to InfoSec, is the practice of defending information ...
Tsys Globalsolutions
Advance Virtual Channel Reservation Chinese 0920
We present a smart communication service called Advance Virtual Channel Reservation (AVCR) to provide a highway to target packets, which can greatly ...
ieeeComputerSociety
SPACE: Semi-Partitioned CachE for Energy Efficient, Hard Real-Time Systems Spanish 0417
Abstract—Multi-core processors are increasingly popular because they yield higher performance, but they also present new challenges for hard real-time ...
ieeeComputerSociety
Cloud Computing: Drivers & Risks
Cloud computing overview, including SaaS, PaaS and IaaS delivery models, market size, cloud AI services (AIaaS and RaaS), cost and broader digital ...
ExplainingComputers
In Their Own Words: Naga Durga Prasad Avirneni, and Arun Somani
The threat of soft error induced system failure in computing systems has become more prominent, as we adopt ultra-deep submicron process technologies.
ieeeComputerSociety
Everything You Need to Know About 5G
Millimeter waves, massive MIMO, full duplex, beamforming, and small cells are just a few of the technologies that could enable ultrafast 5G networks.
IEEE Spectrum
Arb: Efficient Arbitrary-Precision 2 Midpoint-Radius Interval Arithmetic (0817)
Arb is a C library for arbitrary-precision interval arithmetic using the midpoint-radius representation, also known as ball 5 arithmetic. It supports real and complex ...
ieeeComputerSociety
Energy-Aware Adaptive Restore Schemes for MLC STT-RAM Cache (0517)-Chinese
For the sake of higher cell density while achieving near-zero standby power, recent research progress in Magnetic Tunneling Junction (MTJ) devices has ...
ieeeComputerSociety
Static Instruction Scheduling for High Performance on Limited Hardware (0518)
Complex out-of-order (OoO) processors have been designed to overcome the restrictions of outstanding long-latency misses at the cost of increased energy ...
ieeeComputerSociety
Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient
1Crore Projects
A Parallel Patient Treatment Time Prediction Algorithm and Its Applications in Hospital
We are ready to provide guidance to successfully complete your projects and also download the abstract, base paper from our website Visit ...
DHS Projects Bangalore
Efficient Detection for Malicious and Random Errors in Additive Encrypted Computation Chinese (0118)
Although data confidentiality is the primary security objective in additive encrypted computation applications, such as the aggregation of encrypted votes in ...
ieeeComputerSociety
Wearable computers
Universalppts
Parallel Reproducible Summation
Reproducibility, i.e. getting bitwise identical floating point results from multiple runs of the same program, is a property that many users depend on either for ...
ieeeComputerSociety
Efficient Detection for Malicious and Random Errors in Additive Encrypted Computation Spanish (0118)
Although data confidentiality is the primary security objective in additive encrypted computation applications, such as the aggregation of encrypted votes in ...
ieeeComputerSociety
A New Design of In-Memory File System Based on File Virtual Address Framework (Chinese 1016))
The emerging technologies of persistent memory, such as PCM, MRAM, provide opportunities for preserving files in memory. Traditional file system structures ...
ieeeComputerSociety
Progressive Congestion Management Based on Packet Marking and Validation Techniques
Congestion management in multistage interconnection networks is a serious problem not completely solved. In order to avoid the degradation of network ...
ieeeComputerSociety
Managing data chaos with intelligent computational memory | Evangelos Eleftheriou | TEDxChalkida
Data, memory and neuromorphic computing. Dr. Enangelos Eleftheriou explains how mimicking nature we can create more efficient computing systems and ...
TEDx Talks
Linear Branch Entropy: Characterizing and Optimizing Branch Behavior...0317 Spanish
In this paper, we propose linear branch entropy, a new metric for characterizing branch behavior. Linear branch entropy is independent of the configuration of a ...
ieeeComputerSociety
Stanford Seminar - New Golden Age for Computer Architecture
EE380: Computer Systems Colloquium Seminar New Golden Age for Computer Architecture: Domain-Specific Hardware/Software Co-Design, Enhanced ...
stanfordonline
A Light-Weight White-Box Encryption Scheme for Securing Distributed Embedded Devices 1019
Distributed embedded devices are widely used in sensor networks and the Internet of Things for gathering and sending data. Many of them are deployed in an ...
ieeeComputerSociety