


default search action
IEEE Embedded Systems Letters, Volume 10
Volume 10, Number 1, March 2018
- Sybille Hellebrand, Jörg Henkel, Anand Raghunathan
, Hans-Joachim Wunderlich:
Guest Editors' Introduction. 1 - Thierry Moreau
, Joshua San Miguel
, Mark Wyse
, James Bornholt, Armin Alaghi
, Luis Ceze, Natalie D. Enright Jerger
, Adrian Sampson
:
A Taxonomy of General Purpose Approximate Computing Techniques. 2-5 - Minho Ha
, Sunggu Lee
:
Multipliers With Approximate 4-2 Compressors and Error Recovery Modules. 6-9 - Samira Ataei, James E. Stine
:
A 64 kB Approximate SRAM Architecture for Low-Power Video Applications. 10-13 - Mohsen Imani
, Daniel Peroni, Tajana Rosing:
Nvalt: Nonvolatile Approximate Lookup Table for GPU Acceleration. 14-17 - Seogoo Lee
, Andreas Gerstlauer
:
Data-Dependent Loop Approximations for Performance-Quality Driven High-Level Synthesis. 18-21 - Tobias Isenberg, Marie-Christine Jakobs
, Felix Pauck
, Heike Wehrheim
:
Validity of Software Verification Results on Approximate Hardware. 22-25 - Ilia Polian
:
Test and Reliability Challenges for Approximate Circuitry. 26-29
Volume 10, Number 2, June 2018
- Michael Lass
, Thomas D. Kühne, Christian Plessl
:
Using Approximate Computing for the Calculation of Inverse Matrix pth Roots. 33-36 - Jorge Echavarria
, Stefan Wildermann, Eduard Potwigin
, Jürgen Teich
:
Efficient Arithmetic Error Rate Calculus for Visibility Reduced Approximate Adders. 37-40 - Mohammad Taghi Teimoori
, Alireza Ejlali
:
An Instruction-Level Quality-Aware Method for Exploiting STT-RAM Read Approximation Techniques. 41-44 - Ihsen Alouani
, Hamzeh Ahangari, Ozcan Ozturk
, Smaïl Niar:
A Novel Heterogeneous Approximate Multiplier for Low Power and High Performance. 45-48 - Chien-Hui Liao
, Charles H.-P. Wen
:
SVM-Based Dynamic Voltage Prediction for Online Thermally Constrained Task Scheduling in 3-D Multicore Processors. 49-52
Volume 10, Number 3, September 2018
- Kyriakos Georgiou
, Samuel Xavier de Souza
, Kerstin Eder:
The IoT Energy Challenge: A Software Perspective. 53-56 - Konstantin Berestizshevsky
, Shlomo Weiss:
Decoupled Branch Predictor for Embedded DSP. 57-60 - Amir M. Rahmani
, Axel Jantsch
, Nikil D. Dutt
:
HDGM: Hierarchical Dynamic Goal Management for Many-Core Resource Allocation. 61-64 - Fabien Majéric, Benoit Gonzalvo, Lilian Bossuet
:
JTAG Fault Injection Attack. 65-68 - Janarthanam Subramaniam
, Raju Jagadeesh Kannan, David Ebenezer:
Parallel and Pipelined 2-D Median Filter Architecture. 69-72 - Farkhanda Syed
, Zahid Ullah
, Manish Kumar Jaiswal:
Fast Content Updating Algorithm for an SRAM-Based TCAM on FPGA. 73-76 - Christian Pilato
, Siddharth Garg, Kaijie Wu, Ramesh Karri
, Francesco Regazzoni
:
Securing Hardware Accelerators: A New Challenge for High-Level Synthesis. 77-80 - Michail Maniatakos
:
Guest Editor Introduction: Embedded Security Challenge. 81-82 - Gnanambikai Krishnakumar
, Patanjali SLPSK
, Prasanna Karthik Vairam
, Chester Rebeiro, Kamakoti Veezhinathan:
GANDALF: A Fine-Grained Hardware-Software Co-Design for Preventing Memory Attacks. 83-86 - Cyril Bresch, David Hély
, Athanasios Papadimitriou
, Adrien Michelet-Gignoux, Laurent Amato, Thomas Meyer:
Stack Redundancy to Thwart Return Oriented Programming in Embedded Systems. 87-90 - Debapriya Basu Roy
, Manaar Alam
, Sarani Bhattacharya, Vidya Govindan, Francesco Regazzoni
, Rajat Subhra Chakraborty
, Debdeep Mukhopadhyay
:
Customized Instructions for Protection Against Memory Integrity Attacks. 91-94 - Nektarios Georgios Tsoutsos
, Michail Maniatakos
:
Anatomy of Memory Corruption Attacks and Mitigations in Embedded Systems. 95-98 - Thiago Alves
, Rishabh Das, Thomas H. Morris
:
Embedding Encryption and Machine Learning Intrusion Prevention Systems on Programmable Logic Controllers. 99-102 - Patrick Cronin
, Fateme S. Hosseini, Chengmo Yang:
A Low Overhead Solution to Resilient Assembly Lines Built From Legacy Controllers. 103-106
Volume 10, Number 4, December 2018
- Baozi Chen
, Lei Wang, Qingbo Wu, Yusong Tan, Peng Zou:
Cross Hardware-Software Boundary Exploration for Scalable and Optimized Deep Learning Platform Design. 107-110 - Sumana Ghosh
, Soumyajit Dey
, Pallab Dasgupta
:
Co-Synthesis of Loop Execution Patterns for Multihop Control Networks. 111-114 - Prabal Basu
, Chidhambaranathan Rajamanikkam, Aatreyi Bal
, Pramesh Pandey, Trevor Carter, Koushik Chakraborty
, Sanghamitra Roy
:
FIFA: Exploring a Focally Induced Fault Attack Strategy in Near-Threshold Computing. 115-118 - Hiroki Hihara
, Akira Iwasaki, Masanori Hashimoto
, Hiroyuki Ochi, Yukio Mitsuyama, Hidetoshi Onodera
, Hiroyuki Kanbara, Kazutoshi Wakabayashi, Tadahiko Sugibayashi, Takashi Takenaka, Hiromitsu Hada, Munehiro Tada
, Makoto Miyamura, Toshitsugu Sakamoto:
Sensor Signal Processing Using High-Level Synthesis With a Layered Architecture. 119-122

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.