


default search action
11th IGSC 2020: Pullman, WA, USA - Workshops
- 11th International Green and Sustainable Computing Workshops, IGSC 2020 Workshops, Pullman, WA, USA, October 19-22, 2020. IEEE 2020, ISBN 978-1-6654-1552-1
- Keyang Yu, Dong Chen:
SmartAttack: Open-source Attack Models for Enabling Security Research in Smart Homes. 1-8 - Adarsha Balaji, Anup Das
:
Compiling Spiking Neural Networks to Mitigate Neuromorphic Hardware Constraints. 1-3 - Twisha Titirsha, Anup Das
:
Reliability-Performance Trade-offs in Neuromorphic Computing. 1-5 - Arman Roohi:
Normally-off computing design methodology using spintronics: from device to architectures. 1-4 - Fabiha Nowshin, Yuhao Zhang, Lingjia Liu, Yang Yi:
Recent Advances in Reservoir Computing With A Focus on Electronic Reservoirs. 1-8 - Quang Nguyen, Shervin Hajiamini, Behrooz A. Shirazi:
An Improved Stochastic-based Approach for Optimizing Energy-Time Tradeoff in Multicore Systems. 1-8 - Cory E. Merkel:
Exploring Energy-Accuracy Tradeoffs in AI Hardware. 1-7 - Stephan Holly, Alexander Wendt, Martin Lechner:
Profiling Energy Consumption of Deep Neural Networks on NVIDIA Jetson Nano. 1-6 - Shyamala Palanisamy
, Mimi Xie:
Comparative Study of Persistently Secure Non-Volatile Processors Towards Designing Secure IoT Devices. 1-8 - Samaneh Pazouki, Ehsan Naderi
, Arash Asrari:
Interconnected Energy Hubs including DERs Targeted by FDI Cyberattacks. 1-6 - Shihao Song, Anup Das
:
Design Methodologies for Reliable and Energy-efficient PCM Systems. 1-3 - Tathagata Bhattacharya, Xiao Qin:
Modeling Energy Efficiency of Future Green Data centers. 1-3 - Md. Shahanur Alam, Chris Yakopcic, Guru Subramanyam, Tarek M. Taha:
Memristor Based Neuromorphic Network Security System Capable of Online Incremental Learning and Anomaly Detection. 1-8 - Chinasa Sueyoshi, Hideya Takagi, Kentaro Inenaga:
Analysis of the Number of Passengers in Consecutive National Holiday Collected with a Practical Management Support System in the Case of Community Bus of Shingu Town in Japan. 1-8 - Biswadip Maity, Bryan Donyanavard, Nikil D. Dutt:
Self-aware Memory Management for Emerging Energy-efficient Architectures. 1-8 - Wenkai Guan, Cristinel Ababei:
Algorithm-Hardware Co-Design in Computing Systems: From Embedded Systems to the Cloud. 1-3 - Andrew Ford
, Rashmi Jha:
Memristive Device Variability Performance Impact on Neuromorphic Machine Learning Hardware. 1-7 - Abhijitt Dhavlle, Sai Manoj Pudukotai Dinakarrao:
A Comprehensive Review of ML-based Time-Series and Signal Processing Techniques and their Hardware Implementations. 1-8 - Xiaopu Peng
, Xiao Qin:
Energy Efficient Data Centers Powered by On-site Renewable Energy and UPS Devices. 1-3 - Catherine D. Schuman
, Steven R. Young, J. Parker Mitchell, J. Travis Johnston, Derek C. Rose, Bryan P. Maldonado, Brian C. Kaul:
Low Size, Weight, and Power Neuromorphic Computing to Improve Combustion Engine Efficiency. 1-8 - Yassine Jaoudi, Chris Yakopcic, Tarek M. Taha:
Conversion of an Unsupervised Anomaly Detection System to Spiking Neural Network for Car Hacking Identification. 1-4

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.