Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 132 matches
- 2015
- Andreas Abel, Jan Reineke:
MeMin: SAT-based Exact Minimization of Incompletely Specified Mealy Machines. ICCAD 2015: 94-101 - Ali Ahmadi, Haralampos-G. D. Stratigopoulos, Amit Nahar, Bob Orr, Michael Pas, Yiorgos Makris:
Yield Forecasting in Fab-to-Fab Production Migration Based on Bayesian Model Fusion. ICCAD 2015: 9-14 - Kishwar Ahmed, Mohammad A. Islam, Shaolei Ren:
A Contract Design Approach for Colocation Data Center Demand Response. ICCAD 2015: 635-640 - Nauman Ahmed, Vlad Mihai Sima, Ernst Houtgast, Koen Bertels, Zaid Al-Ars:
Heterogeneous Hardware/Software Acceleration of the BWA-MEM DNA Alignment Algorithm. ICCAD 2015: 240-246 - Armin Alaghi, Wei-Ting Jonas Chan, John P. Hayes, Andrew B. Kahng, Jiajia Li:
Optimizing Stochastic Circuits for Accuracy-Energy Tradeoffs. ICCAD 2015: 178-185 - Md Tanvir Arafin, Gang Qu:
RRAM Based Lightweight User Authentication. ICCAD 2015: 139-145 - Debashis Banerjee, Shreyas Sen, Abhijit Chatterjee:
Self Learning Analog/Mixed-Signal/RF Systems: Dynamic Adaptation to Workload and Environmental Uncertainties. ICCAD 2015: 59-64 - Abhishek Basak, Swarup Bhunia, Sandip Ray:
A Flexible Architecture for Systematic Implementation of SoC Security Policies. ICCAD 2015: 536-543 - Ronald D. Blanton, Xin Li, Ken Mai, Diana Marculescu, Radu Marculescu, Jeyanandh Paramesh, Jeff G. Schneider, Donald E. Thomas:
Statistical Learning in Chip (SLIC). ICCAD 2015: 664-669 - Paul Bogdan, Yuankun Xue:
Mathematical Models and Control Algorithms for Dynamic Optimization of Multicore Platforms: A Complex Dynamics Approach. ICCAD 2015: 170-175 - Ermao Cai, Diana Marculescu:
TEI-Turbo: Temperature Effect Inversion-Aware Turbo Boost for FinFET-Based Multi-Core Systems. ICCAD 2015: 500-507 - Vito Giovanni Castellana, Marco Minutoli, Alessandro Morari, Antonino Tumeo, Marco Lattuada, Fabrizio Ferrandi:
High Level Synthesis of RDF Queries for Graph Analytics. ICCAD 2015: 323-330 - Hung-Sheng Chang, Yuan-Hao Chang, Tei-Wei Kuo, Hsiang-Pang Li:
A Light-Weighted Software-Controlled Cache for PCM-based Main Memory Systems. ICCAD 2015: 22-29 - Yu-Ming Chang, Yung-Chun Li, Yuan-Hao Chang, Tei-Wei Kuo, Chih-Chang Hsieh, Hsiang-Pang Li:
On Relaxing Page Program Disturbance over 3D MLC Flash Memory. ICCAD 2015: 479-486 - Wenjie Che, Fareena Saqib, Jim Plusquellic:
PUF-Based Authentication. ICCAD 2015: 337-344 - Wei-Ming Chen, Sheng-Wei Cheng, Pi-Cheng Hsiu, Tei-Wei Kuo:
A User-Centric CPU-GPU Governing Framework for 3D Games on Mobile Devices. ICCAD 2015: 224-231 - Xiaoming Chen, Xin Li, Sheldon X.-D. Tan:
From Robust Chip to Smart Building: CAD Algorithms and Methodologies for Uncertainty Analysis of Building Performance. ICCAD 2015: 457-464 - Pai-Yu Chen, Binbin Lin, I-Ting Wang, Tuo-Hung Hou, Jieping Ye, Sarma B. K. Vrudhula, Jae-sun Seo, Yu Cao, Shimeng Yu:
Mitigating Effects of Non-ideal Synaptic Device Characteristics for On-chip Learning. ICCAD 2015: 194-199 - Hari Cherupalli, John Sartori:
Graph-based Dynamic Analysis: Efficient Characterization of Dynamic Timing and Activity Distributions. ICCAD 2015: 729-735 - Ting-Wei Chiang, Jie-Hong R. Jiang:
Property-Directed Synthesis of Reactive Systems from Safety Specifications. ICCAD 2015: 794-801 - Jason Cong, Zhenman Fang, Michael Gill, Glenn Reinman:
PARADE: A Cycle-Accurate Full-System Simulation Platform for Accelerator-Rich Architectural Design and Exploration. ICCAD 2015: 380-387 - Jason Cong, Cody Hao Yu:
Impact of Loop Transformations on Software Reliability. ICCAD 2015: 278-285 - Nga Dang, Roberto Valentini, Eli Bozorgzadeh, Marco Levorato, Nalini Venkatasubramanian:
A Unified Stochastic Model for Energy Management in Solar-Powered Embedded Systems. ICCAD 2015: 621-626 - Nima Karimpour Darav, Andrew A. Kennings, David T. Westwick, Laleh Behjat:
High Performance Global Placement and Legalization Accounting for Fence Regions. ICCAD 2015: 514-519 - Sourav Das, Janardhan Rao Doppa, Daehyun Kim, Partha Pratim Pande, Krishnendu Chakrabarty:
Optimizing 3D NoC Design for Energy Efficiency: A Machine Learning Approach. ICCAD 2015: 705-712 - Vivek De:
Fine-Grain Power Management in Manycore Processor and System-on-Chip (SoC) Designs. ICCAD 2015: 159-164 - Sorin Dobre, Andrew B. Kahng, Jiajia Li:
Mixed Cell-Height Implementation for Improved Design Quality in Advanced Nodes. ICCAD 2015: 854-860 - Nikil D. Dutt, Axel Jantsch, Santanu Sarma:
Self-Aware Cyber-Physical Systems-on-Chip. ICCAD 2015: 46-50 - Shao-Yun Fang, Yun-Xiang Hong, Yi-Zhen Lu:
Simultaneous Guiding Template Optimization and Redundant Via Insertion for Directed Self-Assembly. ICCAD 2015: 410-417 - Nicole Fern, Kwang-Ting (Tim) Cheng:
Detecting Hardware Trojans in Unspecified Functionality Using Mutation Testing. ICCAD 2015: 560-566
skipping 102 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-28 04:44 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint