IEEE – TRANSACTIONS ON ANDROID
Final Year Students Project for IEEE Application Project||Embedded||Civil||Mechanical||Electronic Communication.
Raman Saravanan
IEEE Transactions on Intelligent Transportation Systems
Simulation results of a publication entitled Time-Optimal Maneuver Planning in Automatic Parallel Parking Using a Simultaneous Dynamic Optimization ...
柏李
How to Prepare Research Paper for Publication in MS Word (Easy)
How to Setup Research Paper for Publication in MS Word... Facebook Page : https://www.facebook.com/MeMJTube Follow on twitter: ...
MJ Tube
IEEE Transactions on Signal Processing Top #5 Facts
Rishika Janaki
Thermal Safe Power (TSP): Efficient Power Budgeting for Heterogeneous Manicure...0117 Spanish
Chip manufacturers provide the Thermal Design Power (TDP) for a specific chip. The cooling solution is designed to dissipate this power level. But because TDP ...
ieeeComputerSociety
Node Scaling Analysis for Power-Aware Real-Time Tasks Scheduling Chinese (0816)
Multi-core processors achieve a trade-off between the performance and the power consumption by using Dynamic Voltage Scaling (DVS) techniques. In this ...
ieeeComputerSociety
A Novel Coding Scheme for Secure
E-SYSTEMS-TECHNO PVT LTD Website: www.esystems.co.in Email Id : info@esystems.co.in Phone: + 91 868 652 2186 + 91 868 652 2184 A-2, Ground Floor, ...
Ieee Projects
In Their Own Words: Naga Durga Prasad Avirneni, and Arun Somani
The threat of soft error induced system failure in computing systems has become more prominent, as we adopt ultra-deep submicron process technologies.
ieeeComputerSociety
Loss-Aware Switch Design and Non-Blocking Detection Algorithm for Intra-Chip Scale... Chinese 0616
As the number of on-chip processor cores increases, power-efficient solutions are sought for data communication between cores. The Helix-h non-blocking ...
ieeeComputerSociety
Arb: Efficient Arbitrary-Precision 2 Midpoint-Radius Interval Arithmetic (0817)
Arb is a C library for arbitrary-precision interval arithmetic using the midpoint-radius representation, also known as ball 5 arithmetic. It supports real and complex ...
ieeeComputerSociety
Importance of Coherence Protocols with Network Applications on Multi-Core Processors
An introduction to the IEEE Transactions on Computers article, "Importance of Coherence Protocols with Network Applications on Multi-Core Processors".
ieeeComputerSociety
Configurable XOR Hash Functions for Banked Scratchpad Memories in GPUs (0716 Chinese)
Scratchpad memories in GPU architectures are employed as software-controlled caches to increase the effective GPU memory bandwidth. Through the use of ...
ieeeComputerSociety
Augmented Reading: Conclusions
In this video, author Paolo Montuschi summarizes the key concepts of the article "Augmented Reading: The Present and Future of Electronic Scientific ...
ieeeComputerSociety
Static Instruction Scheduling for High Performance on Limited Hardware (0518)
Complex out-of-order (OoO) processors have been designed to overcome the restrictions of outstanding long-latency misses at the cost of increased energy ...
ieeeComputerSociety
Bubble Budgeting: Throughput Optimization for Dynamic Workloads by Exploiting Dark Cores...(Chinese)
All the cores of a many-core chip cannot be active at the same time, due to reasons like low CPU utilization in server systems and limited power budget in dark ...
ieeeComputerSociety
Enhancing Energy Efficiency of Multimedia Applications in Heterogeneous Mobile...Spanish (1117)
Abstract—Recent smart devices have adopted heterogeneous multi-core processors which have high-performance big cores and 6 low-power small cores.
ieeeComputerSociety
Special Section on Computer Arithmetic in IEEE TC
Call for papers for the special section on Computer Arithmetic in IEEE Transactions on Computers.
edwardDTU
Analytical Fault Tolerance Assessment and Metrics for TSV-Based 3D Network-on-Chip-Chinese
Reliability is one of the most challenging problems in the context of three-dimensional network-on-chip (3D NoC) systems. Reliability analysis is prominent for ...
ieeeComputerSociety
Everything You Need to Know About 5G
Millimeter waves, massive MIMO, full duplex, beamforming, and small cells are just a few of the technologies that could enable ultrafast 5G networks.
IEEE Spectrum
Deadlock Verification of Cache Coherence Protocols and Communication Fabrics
Cache coherence plays a major role in manycore systems. The verification of deadlocks is a challenge in particular, because deadlock freedom is an emerging ...
ieeeComputerSociety
A New Design of In-Memory File System Based on File Virtual Address Framework (Chinese 1016))
The emerging technologies of persistent memory, such as PCM, MRAM, provide opportunities for preserving files in memory. Traditional file system structures ...
ieeeComputerSociety
Hybrid Obfuscation to Protect Against Disclosure Attacks on Embedded Microprocessors Spanish (0318)
The risk of code reverse-engineering is particularly acute for embedded processors which often have limited available resources to protect program information.
ieeeComputerSociety
Utilization Aware Power Management in Reliable and Aggressive Chip Multi Processors - March Chinese
With increasing transistor density on a single chip, processor design in the nanoscale era is hitting power and frequency walls. Due to these challenges, ...
ieeeComputerSociety
Advance Virtual Channel Reservation Chinese 0920
We present a smart communication service called Advance Virtual Channel Reservation (AVCR) to provide a highway to target packets, which can greatly ...
ieeeComputerSociety
How to Publish a Technical Paper with IEEE
In the summer of 2018, the IEEE hosted a series of live authorship workshops in Australia. The workshops focused on how to publish a technical paper with IEEE ...
IEEE Xplore
Deadlock Verification of Cache Coherence Protocols and Communication Fabrics 0217 Chinese
Cache coherence plays a major role in manycore systems. The verification of deadlocks is a challenge in particular, because deadlock freedom is an emerging ...
ieeeComputerSociety
Generation of Models for Wireless Sensor Network Assessment
Authors Domenico Cotroneo, Catello Di Martino, and Marcello Cinque discuss the use of wireless sensor networks for building the next generation of critical ...
ieeeComputerSociety
Extending Unix Pipelines to Graphs
The Unix shell dgsh provides an expressive way to construct sophisticated and efficient non-linear pipelines. You can find the (open-access) full paper at ...
Diomidis Spinellis
SPACE: Semi-Partitioned CachE for Energy Efficient, Hard Real-Time Systems Spanish 0417
Abstract—Multi-core processors are increasingly popular because they yield higher performance, but they also present new challenges for hard real-time ...
ieeeComputerSociety
Bulletproofs: Short Proofs for Confidential Transactions and More
Bulletproofs: Short Proofs for Confidential Transactions and More Benedikt Bünz (Stanford University) Presented at the 2018 IEEE Symposium on Security ...
IEEE Symposium on Security and Privacy
2.3 The Design of Real-Time Programming Systems Based on Process Models
Lecturer: Prof. Tei-Wei Kuo http://www.csie.ntu.edu.tw/~ktw/eng-index.htm Papers for discussions: A.K. Mok, “The Design of Real-Time Programming Systems ...
郭大維Tei-Wei Kuo
Progressive Congestion Management Based on Packet Marking and Validation Techniques
Congestion management in multistage interconnection networks is a serious problem not completely solved. In order to avoid the degradation of network ...
ieeeComputerSociety
Parallel Reproducible Summation
Reproducibility, i.e. getting bitwise identical floating point results from multiple runs of the same program, is a property that many users depend on either for ...
ieeeComputerSociety
Energy-Aware Adaptive Restore Schemes for MLC STT-RAM Cache (0517)-Chinese
For the sake of higher cell density while achieving near-zero standby power, recent research progress in Magnetic Tunneling Junction (MTJ) devices has ...
ieeeComputerSociety
Cloud Computing: Drivers & Risks
Cloud computing overview, including SaaS, PaaS and IaaS delivery models, market size, cloud AI services (AIaaS and RaaS), cost and broader digital ...
ExplainingComputers
Linear Branch Entropy: Characterizing and Optimizing Branch Behavior...0317 Spanish
In this paper, we propose linear branch entropy, a new metric for characterizing branch behavior. Linear branch entropy is independent of the configuration of a ...
ieeeComputerSociety
A Light-Weight White-Box Encryption Scheme for Securing Distributed Embedded Devices 1019
Distributed embedded devices are widely used in sensor networks and the Internet of Things for gathering and sending data. Many of them are deployed in an ...
ieeeComputerSociety
Efficient Detection for Malicious and Random Errors in Additive Encrypted Computation Chinese (0118)
Although data confidentiality is the primary security objective in additive encrypted computation applications, such as the aggregation of encrypted votes in ...
ieeeComputerSociety
In Their Own Words: Carlos Luque
Carlos Luque describes his IEEE Transactions on Computers' article, "CPU Accounting for Multicore Processors," that identifies how an inaccurate measurement ...
ieeeComputerSociety
Efficient Detection for Malicious and Random Errors in Additive Encrypted Computation Spanish (0118)
Although data confidentiality is the primary security objective in additive encrypted computation applications, such as the aggregation of encrypted votes in ...
ieeeComputerSociety
The Rise Of Open-Source Software
Open-source software powers nearly all the world's major companies. This software is freely available, and is developed collaboratively, maintained by a broad ...
CNBC
A Light-Weight White-Box Encryption Scheme for Securing Distributed Embedded Devices (Chinese) 1019
Distributed embedded devices are widely used in sensor networks and the Internet of Things for gathering and sending data. Many of them are deployed in an ...
ieeeComputerSociety