IEEE Transactions on Emerging Topics in Computing, Volume 13 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 13, Number 1, January - March 2025

Radu Marculescu
, Jorge Sá Silva
:
Editorial Special Section on Emerging Edge AI for Human-in-the-Loop Cyber Physical Systems. 3-4

Cláudio Gustavo S. Capanema, Allan Mariano de Souza, Joahannes B. D. da Costa
, Fabrício A. Silva
, Leandro A. Villas
, Antonio A. F. Loureiro
:
A Novel Prediction Technique for Federated Learning. 5-21

Fengqi Li
, Jiaheng Wang
, Weilin Xie, Ning Tong, Deguang Wang
:
X-RAFT: Improve RAFT Consensus to Make Blockchain Better Secure EdgeAI-Human-IoT Data. 22-33

Eric Sturzinger
, Jan Harkes
, Padmanabhan Pillai
, Mahadev Satyanarayanan
:
Edge-Based Live Learning for Robot Survival. 34-47

Enrique Mármol Campos
, Aurora González-Vidal
, José Luis Hernández-Ramos, Antonio F. Skarmeta
:
FedRDF: A Robust and Dynamic Aggregation Function Against Poisoning Attacks in Federated Learning. 48-67

Quy Vu Khanh
, Abdellah Chehri
, Van Anh Dang
, Quy Nguyen Minh
:
Federated Learning Approach for Collaborative and Secure Smart Healthcare Applications. 68-79

Tien Nguyen
, Aengus Daly
, Sergi Gómez-Quintana, Feargal O'Sullivan, Andriy Temko, Emanuel M. Popovici
:
Low-Power Real-Time Seizure Monitoring Using AI-Assisted Sonification of Neonatal EEG. 80-89

Tengyue Li, Simon Fong
, Yaoyang Wu
, Xin Zhang, Qun Song, Huafeng Qin
, Sabah Mohammed
, Tian Feng, Juntao Gao, Andrea Sciarrone
:
Deep Learning Based Intelligent Tumor Analytics Framework for Quantitative Grading and Analyzing Cancer Metastasis: Case of Lymph Node Breast Cancer. 90-104

Kun-Chang Li
, Peng-Bo Wang
, Run-Hua Shi
:
A Novel Privacy-Preserving Range Query Scheme With Permissioned Blockchain for Smart Grid. 105-118

Daniel Casanueva-Morato
, Alvaro Ayuso-Martinez
, Juan Pedro Dominguez-Morales
, Angel Jiménez-Fernandez
, Gabriel Jiménez-Moreno
:
A Bio-Inspired Implementation of a Sparse-Learning Spike-Based Hippocampus Memory Model. 119-133

Pu Sun
, Honggang Qi
, Yuezun Li
, Siwei Lyu
:
FakeTracer: Catching Face-Swap DeepFakes via Implanting Traces in Training. 134-146

Xiao-Yan Li
, Jou-Ming Chang
:
LP-Star: Embedding Longest Paths into Star Networks With Large-Scale Missing Edges Under an Emerging Assessment Model. 147-161

Sangwoo Hwang
, Jaeha Kung
:
One-Spike SNN: Single-Spike Phase Coding With Base Manipulation for ANN-to-SNN Conversion Loss Minimization. 162-172

Md Rasid Ali
, Debranjan Pal
, Abhijit Das
, Dipanwita Roy Chowdhury:
HARPOCRATES: An Approach Towards Efficient Encryption of Data-at-Rest. 173-184

Stefano Longari, Jacopo Jannone, Mario Polino, Michele Carminati
, Andrea Maria Zanchettin
, Mara Tanelli
, Stefano Zanero:
Janus: A Trusted Execution Environment Approach for Attack Detection in Industrial Robot Controllers. 185-195

Qianyu Long
, Christos Anagnostopoulos
, Kostas Kolomvatsos
:
Enhancing Knowledge Reusability: A Distributed Multitask Machine Learning Approach. 207-221

Shao-Wei Dong
, Ching-Hu Lu
:
Dynamically Activated De-Glaring and Detail- Recovery for Low-Light Image Enhancement Directly on Smart Cameras. 222-233

Rongkai Liu
, Yuting Wu
, Kongyange Zhao
, Zhi Zhou
, Xiang Gao
, Xiancheng Lin
, Xiaoxi Zhang
, Xu Chen
, Gang Lu
:
Online Resource Provisioning and Batch Scheduling for AIoT Inference Serving in an XPU Edge Cloud. 234-249

Kentaro Ohno
, Nozomu Togawa
:
Linearizing Binary Optimization Problems Using Variable Posets for Ising Machines. 250-261

Kaicong Ma
, Xinxiang Xu
, Haipeng Yang
, Renzhi Cao
, Lei Zhang
:
Fair Influence Maximization in Social Networks: A Community-Based Evolutionary Algorithm. 262-275
Volume 13, Number 2, April - June 2025

Raffaele Romagnoli, Jianwen Xiang:
Guest Editorial: Special Section on Applied Software Aging and Rejuvenation. 281-282

Dongdong Zhao
, Zhihui Liu
, Fengji Zhang
, Lei Liu
, Jacky Wai Keung
, Xiao Yu
:
NegCPARBP: Enhancing Privacy Protection for Cross-Project Aging-Related Bug Prediction Based on Negative Database. 283-298

Alberto Avritzer, Andrea Janes, Andrea Marin, Catia Trubiani, André van Hoorn, Matteo Camilli
, Daniel S. Menasché, André B. Bondi:
Software Aging Detection and Rejuvenation Assessment in Heterogeneous Virtual Networks. 299-313

Yunzhe Tian
, Yike Li
, Kang Chen, Zhenguo Zhang, Endong Tong
, Jiqiang Liu
, Fangyun Qin, Zheng Zheng, Wenjia Niu
:
Towards Label-Efficient Deep Learning-Based Aging-Related Bug Prediction With Spiking Convolutional Neural Networks. 314-329

Teresa Arauz
, José M. Maestre
, Paula Chanfreut
, Daniel E. Quevedo
, Eduardo F. Camacho
:
Open and Closed-Loop Predictive Control Strategies for Software Rejuvenation. 330-340

Luigi De Simone
, Mario Di Mauro
, Roberto Natella
, Fabio Postiglione
:
Performability of Service Chains With Rejuvenation: A Multidimensional Universal Generating Function Approach. 341-353

Laura Carnevali
, Marco Paolieri
, Riccardo Reali
, Leonardo Scommegna
, Enrico Vicario
:
Cost-Effective Software Rejuvenation Combining Time-Based and Inspection-Based Policies. 354-369

Herderson Couto
, Fumio Machida
, Gustavo Callou
, Ermeson C. Andrade
:
A Comparative Analysis of Software Aging in Relational Database System Environments. 370-381

Mario Barbareschi
, Salvatore Barone
:
Investigating the Resilience Source of Classification Systems for Approximate Computing Techniques. 382-394

Mahdi Zahedi
, Taha Shahroodi
, Carlos Escuin
, Georgi Gaydadjiev
, Stephan Wong, Said Hamdioui
:
BCIM: Efficient Implementation of Binary Neural Network Based on Computation in Memory. 395-408

Andreas Karatzas
, Iraklis Anagnostopoulos
:
Balancing Throughput and Fair Execution of Multi-DNN Workloads on Heterogeneous Embedded Devices. 409-422

Ghada Alsuhli
, Hani Saleh
, Mahmoud Al-Qutayri
, Baker Mohammad
, Thanos Stouraitis
:
Area and Power Efficient FFT/IFFT Processor for FALCON Post-Quantum Cryptography. 423-437

Zirui Zhuang
, Jianan Chen
, Wenchao Xu
, Qi Qi
, Song Guo
, Jingyu Wang
, Lu Lu
, Hongwei Yang
, Jianxin Liao
:
DECC: Delay-Aware Edge-Cloud Collaboration for Accelerating DNN Inference. 438-450

Yun-Wei Chu
, Seyyedali Hosseinalipour
, Elizabeth Tenorio, Laura Melissa Cruz Castro, Kerrie A. Douglas
, Andrew S. Lan
, Christopher G. Brinton
:
Multi-Layer Personalized Federated Learning for Mitigating Biases in Student Predictive Analytics. 451-466

Luigi Coppolino
, Salvatore D'Antonio
, Giovanni Mazzeo
, Roberto Nardone
, Luigi Romano
, Mathieu Schmitt:
WASMBOX: A Lightweight Wasm-Based Runtime for Trustworthy Multi-Tenant Embedded Systems. 467-480

Marlom Bey
, Pratyay Kuila
, Banavath Balaji Naik:
Quantum-Inspired Differential Evolution With Decoding Using Hashing for Efficient User Allocation in Edge Computing Environment. 481-495

Jian Zhang
, Aijiao Cui
, Yier Jin:
Acceleration of the Bootstrapping in TFHE by FPGA. 496-511

Dongwoo Lew
, Jongsun Park
:
CAT SNN: Conversion Aware Training for High Accuracy and Hardware Friendly Spiking Neural Networks. 512-524

Santhosh Sivasubramani
, Bibekananda Paikaray
, Mahathi Kuchibhotla
, Arabinda Haldar
, Chandrasekhar Murapaka
, Amit Acharyya
:
Area Efficient Skyrmion Logic Based Approximate Adder Architecture Design Methodology. 525-536

Xingyan Chen
, Huaming Du
, Mu Wang, Yu Zhao
, Xiaoyang Shu, Changqiao Xu
, Gabriel-Miro Muntean
:
A Novel Adaptive 360circ360^{\circ }360circ360∘ Livestreaming With Graph Representation Learning Based FoV Prediction. 537-550

Haoyu Wang
, Basel Halak
:
TampML: Tampering Attack Detection and Malicious Nodes Localization in NoC-Based MPSoC. 551-562
Volume 13, Number 3, July - September 2025

Xinyu Liu, Wensheng Gan
, Lele Yu, Yi-Ning Liu
:
DP-PartFIM: Frequent Itemset Mining Using Differential Privacy and Partition. 567-577

Ramashish Gaurav
, Duy Anh Do, Thinh Thanh Doan, Yang Yi
:
DALTON - Deep Local Learning in SNNs via Local Weights and Surrogate-Derivative Transfer. 578-590

Zheng Xing
, Xiaochen Yuan
, Chan-Tong Lam
, Penousal Machado
:
NGQR: A Novel Generalized Quantum Image Representation. 591-603

Jesús Mayor
, Laura Raya
, Sofia Bayona
, Alberto Sánchez
:
A Virtual Reality Perceptual Study of Multi-Technique Redirected Walking Method. 604-613

Michal Wronski
, Elzbieta Burek
, Mateusz Lesniak
:
(In)security of Stream Ciphers Against Quantum Annealing Attacks on the Example of the Grain 128 and Grain 128a Ciphers. 614-627

Mahmood Kalemati, Ali Dehghan Nayeri, Somayyeh Koohi
:
Pip-SW: Pipeline Architectures for Accelerating Smith-Waterman Algorithm on FPGA Platforms. 628-639

KyungHyun Han
, Wai-Kong Lee
, Angshuman Karmakar, Myung-Kyu Yi
, Seong Oun Hwang
:
QuripfeNet: Quantum-Resistant IPFE-Based Neural Network. 640-653

Haixu Yu
, Xudong Zhao
:
Deep Reinforcement Learning With Curriculum Design for Quantum State Classification. 654-668

Jong-Yeon Park
, Dongsoo Lee, Seonggyeom Kim
, Wonil Lee, Bo Gyeong Kang, Kouichi Sakurai
:
Fully Parallel, One-Cycle Random Shuffling for Efficient Countermeasure Against Side Channel Attack and Its Complexity Verification. 669-685

Abhishek Moitra
, Abhiroop Bhattacharjee
, Youngeun Kim
, Priyadarshini Panda
:
TReX- Reusing Vision Transformer's Attention for Efficient Xbar-Based Computing. 686-697

Yunfei He
, Yang Wu
, Lishan Huang
, Zhenwan Peng
, Fei Yang
, Yiwen Zhang
, Victor S. Sheng
:
AGSEI: Adaptive Graph Structure Estimation With Long-Tail Distributed Implicit Graphs. 698-713

Ziheng Wang
, Farzad Niknia
, Shanshan Liu
, Pedro Reviriego
, Ahmed Louri
, Fabrizio Lombardi
:
Fault Tolerance in Triplet Network Training: Analysis, Evaluation and Protection Methods. 714-723

Shao-I Chu
, Syuan-An Ke:
Area-Time Efficient Hardware Implementation for Binary Ring-LWE Based Post-Quantum Cryptography. 724-738

Donghyuk Kim, Jae-Young Kim, Wontak Han, Jongsoon Won, Haerang Choi, Yongkee Kwon, Joo-Young Kim:
Darwin: A DRAM-Based Multi-Level Processing-in-Memory Architecture for Column-Oriented Database. 739-752

Satanu Maity
, Mayank Goel
, Manojit Ghose
:
CoaT: Compiler-Assisted Two-Stage Offloading Approach for Data-Intensive Applications Under NMP Framework. 753-767

Yang Zhang, Ruohan Zong
, Lanyu Shang
, Dong Wang
:
A Crowdsourcing-Driven AI Model Design Framework to Public Health Policy-Adherence Assessment. 768-783

Alessio Carpegna
, Alessandro Savino
, Stefano Di Carlo
:
Spiker+: A Framework for the Generation of Efficient Spiking Neural Networks FPGA Accelerators for Inference at the Edge. 784-798

Mingfu Xue
, Can He
, Yushu Zhang
, Zhe Liu
, Weiqiang Liu
:
3D Invisible Cloak: A Robust Person Stealth Attack Against Object Detector in Complex 3D Physical Scenarios. 799-815

Pengfei Huang
, Ke Chen
, Chenghua Wang, Weiqiang Liu
:
Energy Efficient Approximate Computing Framework for DNN Acceleration Using a Probabilistic-Oriented Method. 816-828

Fernando Fernandes dos Santos
, Niccolò Cavagnero
, Marco Ciccone
, Giuseppe Averta, Angeliki Kritikakou
, Olivier Sentieys, Paolo Rech
, Tatiana Tommasi
:
Improving Deep Neural Network Reliability via Transient-Fault-Aware Design and Training. 829-840

Tiamike Dudley
, Jim Plusquellic
, Eirini Eleni Tsiropoulou
, Joshua Goldberg, Daniel Stick
, Daniel S. Lobser:
Scatter-Gather DMA Performance Analysis Within an SoC-Based Control System for Trapped-Ion Quantum Computing. 841-852

Amir Sabbagh Molahosseini
, JunKyu Lee
, Hans Vandierendonck
:
Software-Defined Number Formats for High-Speed Belief Propagation. 853-865

Shih-Chieh Chuang, Ching-Hu Lu
:
Continual Test-Time Adaptation With Weighted Contrastive Learning and Pseudo-Label Correction. 866-877

Georgios Boulougaris
, Kostas Kolomvatsos
:
A Pervasive Edge Computing Model for Proactive Intelligent Data Migration. 878-889

Han Yu
, Hongming Cai
, Sheng-Tung Tsai, Mengyao Li, Pan Hu
, Jiaoyan Chen
, Bingqing Shen
:
Exploiting Entity Information for Robust Prediction Over Event Knowledge Graphs. 890-901

Samitha Somathilaka
, Sasitharan Balasubramaniam
, Daniel P. Martins
:
Analyzing Wet-Neuromorphic Computing Using Bacterial Gene Regulatory Neural Networks. 902-918

Kyungbae Jang
, Sejin Lim
, Yujin Oh
, Hyunjun Kim
, Anubhab Baksi
, Sumanta Chakraborty
, Hwajeong Seo
:
Quantum Implementation and Analysis of SHA-2 and SHA-3. 919-934

Wenming Cao
, Jiewen Zeng
, Qifan Liu
:
FLCL: Feature-Level Contrastive Learning for Few-Shot Image Classification. 935-946

Riya Samanta
, Soumya K. Ghosh
, Sajal K. Das
:
SoSTA: Skill-Oriented Stable Task Assignment With Bidirectional Preferences in Crowdsourcing. 947-963

Chengjie Wang
, Yuejun Zhang
, Ziyu Zhou
:
A Novel Porcelain Fingerprinting Technique. 964-976

Yijun Cui
, Jiatong Tian, Chuanchao Lu, Yang Li, Ziying Ni
, Chenghua Wang, Weiqiang Liu
:
Two Low-Cost and Security-Enhanced Implementations Against Side-Channel Attacks of NTT for Lattice-Based Cryptography. 977-989

Yi-Cheng Chen
, Mu-Ping Chang, Wang-Chien Lee
:
Virtual Reinforcement Learning for Defect Prediction in Smart Manufacturing. 990-1002

Michele Caon
, Clément Choné
, Pasquale Davide Schiavone
, Alexandre Levisse
, Guido Masera
, Maurizio Martina
, David Atienza
:
Scalable and RISC-V Programmable Near-Memory Computing Architectures for Edge Nodes. 1003-1018

Qi Sun
, Yang Lu
, Yinxia Sun
, Jiguo Li
:
Certificateless Sanitizable Signature With Designated Verifier. 1019-1029

Houming Qiu
, Kun Zhu
, Nguyen Cong Luong
, Dusit Niyato
:
Approximated Coded Computing: Towards Fast, Private and Secure Distributed Machine Learning. 1030-1042

Asmaa Abbas
, Mohamed Medhat Gaber
, Mohammed M. Abdelsamea
:
CLOG-CD: Curriculum Learning Based on Oscillating Granularity of Class Decomposed Medical Image Classification. 1043-1054

Sourav Roy
, Mahabub Hasan Mahalat
, Bibhash Sen
:
Design and Implementation of Cost-Effective End-to-End Authentication Protocol for PUF-Enabled IoT Devices. 1055-1067

Sheng Xu
, Chun Li, Le Luo
, Ming Zheng
, Liang Yan
, Xingqi Zou
, Xiaoming Chen
:
Balancing Graph Processing Workloads in Heterogeneous CPU-PIM Systems. 1068-1082

Dae-Il Noh
, Seon-Geun Jeong
, Won-Joo Hwang
:
Hybrid Quantum ResNet for Time Series Classification. 1083-1098

Sidharth Anand, Barsha Mitra
, Soumyadeep Dey
, Abhinav Rao
, Rupsha Dhar, Jaideep Vaidya
:
MALITE: Lightweight Malware Detection and Classification for Constrained Devices. 1099-1112

Hossein Hosseini
, Mohsen Ansari
, Jörg Henkel
:
Dynamic Task Replication With Imperfect Fault Detection in Multicore Cyber-Physical Systems. 1113-1129

Chaoquan Cai
, Dan Lin
, Kannappan Palaniappan
, Chris Clifton
:
Real-Time Access Control for Background and Co-Occurrence Image Privacy Protection. 1130-1141

Seungwoo Choi
, Enhyeok Jang
, Youngmin Kim
, Sungwoo Ahn
, Won Woo Ro
:
q-Point: A Numeric Format for Quantum Circuit Simulation Using Polar Form Complex Numbers. 1142-1155

Mohamad Momtaz Sheykh Ahmad, Sajad Haghzad Klidbary
:
Hardware-Software Co-Design Low-Complexity Fuzzy Algorithm for High-Dimensional Feature Space With In-Situ Learning. 1156-1169

Yunqi Gao
, Bing Hu
, Mahdi Boloursaz Mashhadi
, Wei Wang
, Rahim Tafazolli
, Mérouane Debbah:
PipeDAP: An Efficient Communication Framework for Scheduling Decoupled All-Reduce Primitives in Distributed DNN Training. 1170-1184

Aihua Mao
, Qing Liu, Yuxuan Tang
, Sheng Ye
, Ran Yi
, Minjing Yu
, Yong-Jin Liu
:
DT-Net: Point Cloud Completion Network With Neighboring Adaptive Denoiser and Splitting-Based Upsampling Transformer. 1185-1199

Huabin Wang
, Mingzhao Wang, Xinxin Liu, Yingfan Cheng, Fei Liu
, Jian Zhou
, Liang Tao
:
The Cancelable Multimodal Template Protection Algorithm Based on Random Index. 1200-1214

Tanvi Sharma
, Mustafa Fayez Ali
, Indranil Chakraborty
, Kaushik Roy
:
What, When, Where to Compute-in-Memory for Efficient Matrix Multiplication During Machine Learning Inference. 1215-1229

Sheng Lu
, Liuting Shang
, Sungyong Jung
, Qilian Liang
, Chenyun Pan
:
A Novel RFET-Based FPGA Architecture Based on Delay-Aware Packing Algorithm. 1230-1241

Yang Shi
, Yimin Li
, Qiaoliang Ouyang, Jiayao Gao
, Shengjie Zhao
:
LSTable: A New White-Box Cipher for Embedded Devices in IoT Against Side-Channel Attacks. 1242-1258

Yukimasa Sugizaki
, Daisuke Takahashi
:
Improved Modular Multiplication Algorithms Using Solely IEEE 754 Binary Floating-Point Operations. 1259-1271

Evelina Forno
, Riccardo Pignari
, Vittorio Fra
, Enrico Macii
, Gianvito Urgese
:
Path Integral Quantum Annealing Optimizations Validated on 0-1 Multidimensional Knapsack Problem. 1272-1284

Qiang Wang
, Yiheng Chen
, Fucai Zhou
, Jian Xu
:
Privacy-Preserving Publicly Verifiable Outsourced Distributed Computation Scheme for Matrix Multiplication. 1285-1298

Saurabh Kumar
, Cristian Molinaro
, Lirika Solaa
, V. S. Subrahmanian
:
GLAMP: Generative Learning for Adversarially-Robust Malware Prediction. 1299-1315

Zhuo Li
, Fangxing Geng
:
Incentive Mechanism Design for Hierarchical Federated Learning With Selfishness Queue Stability. 1316-1327

Mina Kato, Tiago Koketsu Rodrigues
, Nei Kato
:
Breakout Local Search Solution to the Offloading Decision Problem in a Multi-Access Edge Computing Cloud-Enabled Network. 1328-1338
Volume 13, Number 4, October - December 2025

Sepehr Tabrizchi
, Rebati Raman Gaire
, Mehrdad Morsali
, Maximilian Liehr, Nathaniel C. Cady
, Shaahin Angizi
, Arman Roohi
:
APRIS: Approximate Processing ReRAM In-Sensor Architecture Enabling Artificial-Intelligence-Powered Edge. 1356-1366

Corey Lammie
, Yuxuan Wang
, Flavio Ponzina
, Joshua Alexander Harrison Klein
, Hadjer Benmeziane
, Marina Zapater
, Irem Boybat
, Abu Sebastian
, Giovanni Ansaloni
, David Atienza
:
LionHeart: A Layer-Based Mapping Framework for Heterogeneous Systems With Analog In-Memory Computing Tiles. 1383-1395

Junzhan Liu, Sifan Sun
, Liang Zhang, Lichuan Luo
, Liang Ran, He Zhang
, Wang Kang
, Weisheng Zhao
:
HiT-CIM: A High-Throughput Compute-in-Memory SRAM Architecture With Simultaneous Weight Loading/Computing and Balance Capabilities. 1396-1409

Minh-Son Le
, Thanh-Dat Nguyen
, Jeong Hoan Park
, Seungkyu Choi
, Ik-Joon Chang
:
PABLO: A Variation-Robust PIM Architecture for Bulk Bitwise Logical Operations in DRAM. 1424-1439

Andrew Dervay
, Wenfeng Zhao
:
BCIM: Constant-Time and High-Throughput Block-Cipher-in-Memory With Massively-Parallel Bit-Serial Execution. 1440-1452

Alex James
, Chithra Reghuvaran, Leon O. Chua
:
Processing In-Memory PUF Watermark Embedding With Cellular Memristor Network. 1453-1464

Youxi Wu
, Zhihong Dong
, Jing Liu
, Yan Li
, Cong Liu
, Lijie Wen
, Xindong Wu
:
OER-Miner: One-Off Episode Rule Mining for Process Event Logs. 1497-1509

Houyi Qi
, Minghui Liwang
, Liqun Fu
, Xianbin Wang
, Huaiyu Dai
, Xiaoyu Xia
:
Oh-Trust: Overbooking and Hybrid Trading-Empowered Resource Scheduling With Smart Reputation Update Over Dynamic Edge Networks. 1553-1564

Nan Wang
, Lijun Lu, Songping Liu, Hongqing Zhu
, Yu Zhu
:
Security-Driven Task Scheduling Under Deadline Constraints for MPSoCs With Untrusted 3PIP Cores. 1577-1590

Josie E. Rodriguez Condia
, Juan-David Guerrero-Balaguera
, Robert Limas Sierra
, Matteo Sonza Reorda
:
Investigating and Mitigating Critical Faults in Floating-Point and Posit Arithmetic Hardware. 1605-1617

Zuher Jahshan
, Itay Merlin
, Esteban Garzón
, Leonid Yavits
:
CAM4: In-Memory Viral Pathogen Genome Classification Using Similarity Search Dynamic Content-Addressable Memory. 1341-1355

Minxuan Zhou
, Yujin Nam
, Pranav Gangwar
, Weihong Xu
, Arpan Dutta, Chris Wilkerson
, Rosario Cammarota
, Saransh Gupta
, Tajana Rosing
:
FHEmem: A Processing In-Memory Accelerator for Fully Homomorphic Encryption. 1367-1382

Jack Cai
, Mostafa Rahimi Azghadi
, Roman Genov
, Amirali Amirsoleimani
:
HyperXArray: Low-Power and Compact Memristive Architecture for In-Memory Encryption on Edge. 1410-1423

Kwondo Ma
, Anurup Saha
, Chandramouli N. Amarnath
, Abhijit Chatterjee
:
SiPT: Signature-Based Predictive Testing of RRAM Crossbar Arrays for Deep Neural Networks. 1465-1480

Rong Wang
, Miaofei Li, Jiankuan Zhao, Anyu Cheng
, Chaolong Jia
:
Traffic Network Socialization: An Adaptive Spatio-Temporal Graph Convolutional Network for Traffic Prediction. 1481-1496

Muhammad Ahmad
, Manuel Mazzara
, Salvatore Distefano, Adil Mehmood Khan
, Muhammad Hassaan Farooq Butt
, Muhammad Usama
, Danfeng Hong
:
GraphMamba: Graph Tokenization Mamba for Hyperspectral Image Classification. 1510-1521

Anhui Tan
, Jianhang Xu, Weiping Ding
, Jiye Liang
, Witold Pedrycz
:
Multi-View Partial Multi-Label Learning via Class Activation Specific Features Collaborative Learning. 1522-1535

Koffka Khan
:
HIFLA: Hilbert-Inspired Federated Learning via Action Principles. 1536-1552

Jiajie Luo
, Jiguang Li
, Lin Xiao
, Jichun Li
, Wenxing Ji, William Holderbaum
, Peng Qi
:
A Novel Proportional-Integral-Parameter Zeroing Neural Network and Its Application to the Quaternion-Valued Time-Varying Linear Matrix Inequality. 1565-1576

Musheer Abdullah
, De Xu
, Zhaoqi Miao
, Yuhao Tai, Sawsan Alhabashi
, Chen Zhao
, Wu Gao
:
Efficient Training and Neuro-Encoding for Bridging Hybrid ANN and SNN Computation. 1591-1604

Tien-Dung Cao
, Nguyen T. Vuong, Thai Q. Le
, Hoang V. N. Dao, Tram Truong Huu
:
Asyn2F: An Asynchronous Federated Learning Framework With Bidirectional Model Aggregation. 1618-1632

Alberto Bosio
, Samuele Germiniani
, Graziano Pravadelli
, Marcello Traiola
:
A Genetic Approach for Automatic AxC Design Exploration at RTL Based on Assertion Mining and Fault Analysis. 1633-1648

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







