


default search action
IET Computers & Digital Techniques, Volume 17
Volume 17, Number 1, January 2023
- Ayoub Sadeghi, Nabiollah Shiri
, Mahmood Rafiee, Abdolreza Darabi, Ebrahim Abiri:
Voltage over-scaling CNT-based 8-bit multiplier by high-efficient GDI-based counters. 1-19 - Rakesh Kumar, Bibhas Ghoshal
:
Machine learning guided thermal management of Open Computing Language applications on CPU-GPU based embedded platforms. 20-28 - Mark Vousden
, Jordan Morris, Graeme McLachlan Bragg, Jonathan Beaumont, Ashur Rafiev, Wayne Luk, David B. Thomas, Andrew D. Brown:
Event-based high throughput computing: A series of case studies on a massively parallel softcore machine. 29-42
Volume 17, Number 2, March 2023
- Yu-Min Lee, Hong-Wen Chiou
, Shin-Yu Shiau, Chi-Wen Pan, Shih-Ting Lin:
Phone-nomenon 2.0: A compact thermal model for smartphones. 43-59 - Ali Ebrahim
, Jalal Khalifat
:
Fast approximation of the top-k items in data streams using FPGAs. 60-73
Volume 17, Numbers 3-4, May-July 2023
Review
- Aurelien T. Mozipo
, John M. Acken:
Residual vulnerabilities to power side channel attacks of lightweight ciphers cryptography competition finalists. 75-88
Original Research
- Ines Ben Halima
, Halim Kacem, Ali Gharsallah:
Efficient implementation of low cost and secure framework with firmware updates. 89-99 - Yanjun Zhu, Zhisheng Wu
, Cuirong Liu:
Research on mapping recognition of arc welding molten pool characterisation and penetration state based on embedded system. 100-110 - Mingfu Xue
, Shichang Sun, Can He, Dujuan Gu, Yushu Zhang
, Jian Wang, Weiqiang Liu
:
ActiveGuard: An active intellectual property protection technique for deep neural networks by leveraging adversarial examples as users' fingerprints. 111-126 - Kushal K. Ponugoti
, Sudarshan K. Srinivasan, Nimish Mathure:
Verification of serialising instructions for security against transient execution attacks. 127-140 - Saleh Abdel-Hafeez
, Shadi M. Harb
:
A novel self-timing CMOS first-edge take-all circuit for on-chip communication systems. 141-148 - Dara Nagaraju
, Nitin Chandrachoodan:
Compressing fully connected layers of deep neural networks using permuted features. 149-161 - Davood Maleki
, Alireza Mansouri
, Ehsan Arianyan:
An integrated taxonomy of standard indicators for ranking and selecting supercomputers. 162-179 - Linan Cao
, Simon J. Bale, Martin A. Trefzer
:
Multi-objective digital circuit block optimisation based on cell mapping in an industrial electronic design automation flow. 180-194 - Hamid Tavakolaee
, Gholamreza Ardeshir, Yasser Baleghi:
Design and analysis of a novel fast adder using logical effort method. 195-208 - Alireza Abdellahi Khorasgani, Mahdi Sajadieh
, Mohammad Rouhollah Yazdani:
Reconstructing a lightweight security protocol in the radio-frequency identification systems. 209-223

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.