IEEE CIS "How to publish your research": Garrison Greenwood
Location: IEEE Congress on Evolutionary Computation 2013 (http://www.cec2013.org/) Panel Discussion "How to publish your research", June 21, 4-6pm Chair: ...
CIS Cyprus
IEEE TRANSACTION ON SECURITY TOPICS 2017
IEEE Information security projects 2017 for Final Year Students Information security, sometimes shortened to InfoSec, is the practice of defending information ...
Tsys Globalsolutions
2018 IEEE Transactions on Image Processing topics with abstract
IEEE IMAGE PROCESSING projects 2018 topic with abstract for Final Year Students.
Tsys Globalsolutions
IEEE CIS "How to publish your research": Kay Chen Tan
Location: IEEE Congress on Evolutionary Computation 2013 (http://www.cec2013.org/) Panel Discussion "How to publish your research", June 21, 4-6pm Chair: ...
CIS Cyprus
2.3 The Design of Real-Time Programming Systems Based on Process Models
Lecturer: Prof. Tei-Wei Kuo http://www.csie.ntu.edu.tw/~ktw/eng-index.htm Papers for discussions: A.K. Mok, “The Design of Real-Time Programming Systems ...
郭大維Tei-Wei Kuo
IEEE Transactions on Intelligent Transportation Systems
Simulation results of a publication entitled Time-Optimal Maneuver Planning in Automatic Parallel Parking Using a Simultaneous Dynamic Optimization ...
柏李
Publishing your research, by Marios Polycarpou
5th Cyprus Workshop on Signal Processing and Informatics (CWSPI) University of Cyprus, Nicosia, Cyprus July 10, 2012 *** Due to a technical problem this ...
Demetrios Eliades
IEEE – TRANSACTIONS ON ANDROID
Final Year Students Project for IEEE Application Project||Embedded||Civil||Mechanical||Electronic Communication.
Raman Saravanan
PETCAM — A Power Efficient TCAM Architecture For Forwarding Tables: Video extra
In this video, coauthor Tania Banerjee-Mishra gives an overview of Ternary Content Addressable Memory and explains how the PETCAM approach improves ...
ieeeComputerSociety
Gestión de Potencia Escalable para sistemas en chip con aplicaciones maleables (Spanish) 1116
Abstract—We present a scalable Dynamic Power Management (DPM) schem e where malleable applications may change their degree of parallelism at run time ...
ieeeComputerSociety
Hybrid Obfuscation to Protect Against Disclosure Attacks on Embedded Microprocessors (0318) Chinese
The risk of code reverse-engineering is particularly acute for embedded processors which often have limited available resources to protect program information.
ieeeComputerSociety
Deadlock Verification of Cache Coherence Protocols and Communication Fabrics 0217 Spanish
Cache coherence plays a major role in manycore systems. The verification of deadlocks is a challenge in particular, because deadlock freedom is an emerging ...
ieeeComputerSociety
On-Chip Communication Network for Efficient Training of Deep Convolutional Networks...(Chinese)
Convolutional Neural Networks (CNNs) have shown a great deal of success in diverse application domains including computer vision, speech recognition, and ...
ieeeComputerSociety
Revisiting Vulnerability Analysis in Modern Microprocessors
The notion of Architectural Vulnerability Factor (AVF) has been extensively used to evaluate various aspects of design robustness. While AVF has been a very ...
ieeeComputerSociety
Polysynchronous Clocking: Exploiting the 2 Skew Tolerance of Stochastic Circuits Spanish 1017
In the paradigm of stochastic computing, arithmetic functions are computed on randomized bit streams. The method 6 naturally and effectively tolerates very high ...
ieeeComputerSociety
Efficient Detection for Malicious and Random Errors in Additive Encrypted Computation Spanish (0118)
Although data confidentiality is the primary security objective in additive encrypted computation applications, such as the aggregation of encrypted votes in ...
ieeeComputerSociety
Generation of Models for Wireless Sensor Network Assessment
Authors Domenico Cotroneo, Catello Di Martino, and Marcello Cinque discuss the use of wireless sensor networks for building the next generation of critical ...
ieeeComputerSociety
Bubble Budgeting: Throughput Optimization for Dynamic Workloads by Exploiting Dark Cores...(Chinese)
All the cores of a many-core chip cannot be active at the same time, due to reasons like low CPU utilization in server systems and limited power budget in dark ...
ieeeComputerSociety
Enhancing Energy Efficiency of Multimedia Applications in Heterogeneous Mobile...Spanish (1117)
Abstract—Recent smart devices have adopted heterogeneous multi-core processors which have high-performance big cores and 6 low-power small cores.
ieeeComputerSociety
Configurable XOR Hash Functions for Banked Scratchpad Memories in GPUs (0716 Chinese)
Scratchpad memories in GPU architectures are employed as software-controlled caches to increase the effective GPU memory bandwidth. Through the use of ...
ieeeComputerSociety
Thermal Safe Power (TSP): Efficient Power Budgeting for Heterogeneous Manicure...0117 Spanish
Chip manufacturers provide the Thermal Design Power (TDP) for a specific chip. The cooling solution is designed to dissipate this power level. But because TDP ...
ieeeComputerSociety
Deadlock Verification of Cache Coherence Protocols and Communication Fabrics
Cache coherence plays a major role in manycore systems. The verification of deadlocks is a challenge in particular, because deadlock freedom is an emerging ...
ieeeComputerSociety
Cloud Computing: Drivers & Risks
Cloud computing overview, including SaaS, PaaS and IaaS delivery models, market size, cloud AI services (AIaaS and RaaS), cost and broader digital ...
ExplainingComputers
Analytical Fault Tolerance Assessment and Metrics for TSV-Based 3D Network-on-Chip-Chinese
Reliability is one of the most challenging problems in the context of three-dimensional network-on-chip (3D NoC) systems. Reliability analysis is prominent for ...
ieeeComputerSociety
In Their Own Words: Naga Durga Prasad Avirneni, and Arun Somani
The threat of soft error induced system failure in computing systems has become more prominent, as we adopt ultra-deep submicron process technologies.
ieeeComputerSociety
Hybrid Obfuscation to Protect Against Disclosure Attacks on Embedded Microprocessors Spanish (0318)
The risk of code reverse-engineering is particularly acute for embedded processors which often have limited available resources to protect program information.
ieeeComputerSociety
Everything You Need to Know About 5G
Millimeter waves, massive MIMO, full duplex, beamforming, and small cells are just a few of the technologies that could enable ultrafast 5G networks.
IEEE Spectrum
Efficient Detection for Malicious and Random Errors in Additive Encrypted Computation Chinese (0118)
Although data confidentiality is the primary security objective in additive encrypted computation applications, such as the aggregation of encrypted votes in ...
ieeeComputerSociety
Deadlock Verification of Cache Coherence Protocols and Communication Fabrics 0217 Chinese
Cache coherence plays a major role in manycore systems. The verification of deadlocks is a challenge in particular, because deadlock freedom is an emerging ...
ieeeComputerSociety
Utilization Aware Power Management in Reliable and Aggressive Chip Multi Processors - March Chinese
With increasing transistor density on a single chip, processor design in the nanoscale era is hitting power and frequency walls. Due to these challenges, ...
ieeeComputerSociety
Loss-Aware Switch Design and Non-Blocking Detection Algorithm for Intra-Chip Scale... Chinese 0616
As the number of on-chip processor cores increases, power-efficient solutions are sought for data communication between cores. The Helix-h non-blocking ...
ieeeComputerSociety
Advance Virtual Channel Reservation Chinese 0920
We present a smart communication service called Advance Virtual Channel Reservation (AVCR) to provide a highway to target packets, which can greatly ...
ieeeComputerSociety
Wi-Fi IEEE 802.11 Standard wlan data communication lecture for GATE Computer Science wifi
These videos are useful for examinations like NTA UGC NET Computer Science and Applications, GATE Computer Science, ISRO, DRDO, Placements, etc.
NTA UGC NET Computer Science CSE
SPACE: Semi-Partitioned CachE for Energy Efficient, Hard Real-Time Systems Spanish 0417
Abstract—Multi-core processors are increasingly popular because they yield higher performance, but they also present new challenges for hard real-time ...
ieeeComputerSociety
Static Instruction Scheduling for High Performance on Limited Hardware (0518)
Complex out-of-order (OoO) processors have been designed to overcome the restrictions of outstanding long-latency misses at the cost of increased energy ...
ieeeComputerSociety
Stanford Seminar - New Golden Age for Computer Architecture
EE380: Computer Systems Colloquium Seminar New Golden Age for Computer Architecture: Domain-Specific Hardware/Software Co-Design, Enhanced ...
stanfordonline
Bulletproofs: Short Proofs for Confidential Transactions and More
Bulletproofs: Short Proofs for Confidential Transactions and More Benedikt Bünz (Stanford University) Presented at the 2018 IEEE Symposium on Security ...
IEEE Symposium on Security and Privacy
Managing data chaos with intelligent computational memory | Evangelos Eleftheriou | TEDxChalkida
Data, memory and neuromorphic computing. Dr. Enangelos Eleftheriou explains how mimicking nature we can create more efficient computing systems and ...
TEDx Talks
Arb: Efficient Arbitrary-Precision 2 Midpoint-Radius Interval Arithmetic (0817)
Arb is a C library for arbitrary-precision interval arithmetic using the midpoint-radius representation, also known as ball 5 arithmetic. It supports real and complex ...
ieeeComputerSociety
Energy-Aware Adaptive Restore Schemes for MLC STT-RAM Cache (0517)-Chinese
For the sake of higher cell density while achieving near-zero standby power, recent research progress in Magnetic Tunneling Junction (MTJ) devices has ...
ieeeComputerSociety
IEEE Transactions on Signal Processing Top #5 Facts
Rishika Janaki
Lec 23: How to Explore Computer Architecture?
Advanced Computer Architecture Course URL: https://swayam.gov.in/nd1_noc19_cs62/... Prof. John Jose Dept of Computer Science & Engineering IIT ...
NPTEL IIT Guwahati