咨询与建议

限定检索结果

文献类型

  • 822 篇 会议
  • 31 篇 期刊文献

馆藏范围

  • 853 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 409 篇 工学
    • 393 篇 计算机科学与技术...
    • 319 篇 软件工程
    • 82 篇 电子科学与技术(可...
    • 60 篇 电气工程
    • 43 篇 信息与通信工程
    • 39 篇 控制科学与工程
    • 9 篇 动力工程及工程热...
    • 7 篇 机械工程
    • 7 篇 光学工程
    • 5 篇 材料科学与工程(可...
    • 5 篇 建筑学
    • 4 篇 土木工程
    • 4 篇 安全科学与工程
    • 3 篇 仪器科学与技术
    • 3 篇 化学工程与技术
    • 3 篇 航空宇航科学与技...
    • 2 篇 力学(可授工学、理...
    • 2 篇 环境科学与工程(可...
    • 2 篇 生物医学工程(可授...
  • 99 篇 理学
    • 58 篇 数学
    • 37 篇 系统科学
    • 17 篇 物理学
    • 8 篇 统计学(可授理学、...
    • 2 篇 化学
  • 55 篇 管理学
    • 45 篇 管理科学与工程(可...
    • 15 篇 工商管理
    • 13 篇 图书情报与档案管...
  • 5 篇 法学
    • 4 篇 社会学
    • 1 篇 法学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 医学
  • 1 篇 艺术学

主题

  • 167 篇 hardware
  • 94 篇 computer archite...
  • 76 篇 embedded system
  • 58 篇 application soft...
  • 56 篇 permission
  • 50 篇 embedded systems
  • 47 篇 system-on-a-chip
  • 45 篇 software
  • 44 篇 algorithm design...
  • 42 篇 computational mo...
  • 41 篇 energy consumpti...
  • 41 篇 field programmab...
  • 35 篇 costs
  • 34 篇 system-on-chip
  • 32 篇 space exploratio...
  • 30 篇 high level synth...
  • 29 篇 system-level des...
  • 27 篇 timing
  • 26 篇 delay
  • 25 篇 embedded softwar...

机构

  • 8 篇 center for embed...
  • 6 篇 school of comput...
  • 6 篇 arizona state un...
  • 6 篇 center for embed...
  • 6 篇 department of co...
  • 5 篇 school of inform...
  • 5 篇 philips research...
  • 5 篇 univ calif river...
  • 5 篇 institute for in...
  • 5 篇 department of el...
  • 4 篇 department of co...
  • 4 篇 university of er...
  • 4 篇 tu braunschweig
  • 4 篇 university of do...
  • 4 篇 tensilica
  • 4 篇 univ elect sci &...
  • 4 篇 nec laboratories...
  • 4 篇 philips research...
  • 3 篇 integrated signa...
  • 3 篇 east china norma...

作者

  • 10 篇 ogras umit y.
  • 9 篇 sri parameswaran
  • 9 篇 nikil dutt
  • 7 篇 rolf ernst
  • 7 篇 parameswaran sri
  • 7 篇 leupers rainer
  • 6 篇 jiang wei
  • 6 篇 dutt nikil
  • 6 篇 robert p. dick
  • 6 篇 mitra tulika
  • 6 篇 rainer leupers
  • 6 篇 andreas gerstlau...
  • 5 篇 pasricha sudeep
  • 5 篇 gerd ascheid
  • 5 篇 greg stitt
  • 5 篇 jinyu zhan
  • 5 篇 umit y. ogras
  • 5 篇 tei-wei kuo
  • 5 篇 wei jiang
  • 5 篇 yuan-hao chang

语言

  • 850 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"任意字段=2024 International Conference on Hardware/Software Codesign and System Synthesis"
853 条 记 录,以下是211-220 订阅
排序:
An Ultra-Low Energy Human Activity Recognition Accelerator for Wearable Health Applications
收藏 引用
ACM TRANSACTIONS ON EMBEDDED COMPUTING systemS 2019年 第5期18卷 49-49页
作者: Bhat, Ganapati Tuncel, Yigit An, Sizhe Lee, Hyung Gyu Ogras, Umit Y. Arizona State Univ Sch Elect Comp & Energy Engn Tempe AZ 85287 USA Daegu Univ Sch Comp & Commun Engn Daegu 38453 South Korea
Human activity recognition (HAR) has recently received significant attention due to its wide range of applications in health and activity monitoring. The nature of these applications requires mobile or wearable device... 详细信息
来源: 评论
Work-in-Progress: On Leveraging Approximations for Exact system-level Design Space Exploration
Work-in-Progress: On Leveraging Approximations for Exact Sys...
收藏 引用
international conference on hardware/software codesign and system synthesis (CODES)
作者: Kai Neubauer Christian Haubelt Philipp Wanko Torsten Schaub University of Rostock Germany University of Potsdam Germany
In order to find good design points for embedded systems, an efficient exploration of the design space is imperative. The ever-increasing complexity of embedded systems, however, results in a deterioration of the over... 详细信息
来源: 评论
Work-in-Progress: Co-Design of Security-Critical Real-Time systems to Prevent Fault Injection Attacks
Work-in-Progress: Co-Design of Security-Critical Real-Time S...
收藏 引用
international conference on hardware/software codesign and system synthesis (CODES)
作者: Wei Jiang Liugen Xiu Jinyu Zhan Ke Jiang School of Information & Software Engineering University of Electronic Science & Technology of China China Research and Engineering Department Veoneer Sweden
We present a system-level co-design approach for security-critical real-time systems to resist fault injection attack. We focus on protecting the encryption/decryption of confidential messages over the internal commun... 详细信息
来源: 评论
Work-in-Progress: A Chip-Level Security Framework for Assessing Sensor Data Integrity
Work-in-Progress: A Chip-Level Security Framework for Assess...
收藏 引用
international conference on hardware/software codesign and system synthesis (CODES)
作者: Taimour Wehbe Vincent J. Mooney David C. Keezer Georgia Institute of Technology Atlanta Georgia USA
The continuously increasing inter-connectivity of sensor nodes that form the basis of the Internet-of-Things results in new avenues of attack exploitable by adversaries to maliciously modify data captured by these nod... 详细信息
来源: 评论
Work-in-Progress: Towards the Application of Flask Security Architecture to SoC Design  12
Work-in-Progress: Towards the Application of Flask Security ...
收藏 引用
international conference on hardware/software codesign and system synthesis (CODES+ISSS)
作者: Hategekimana, Festus Bobda, Christophe Univ Arkansas Fayetteville AR 72701 USA
In this work, we explore a security reference monitor (RM) design which borrows from the Flask security architecture. Our RM design goal is to achieve complete mediation by checking and verifying the authority and the... 详细信息
来源: 评论
SWARAM: Portable Energy and Cost Efficient Embedded system for Genomic Processing
收藏 引用
ACM TRANSACTIONS ON EMBEDDED COMPUTING systemS 2019年 第5期18卷 61-61页
作者: Mohanty, Ram Prasad Gamaarachchi, Hasindu Lambert, Andrew Parameswaran, Sri Univ New South Wales Canberra ACT 2612 Australia Univ New South Wales Sydney NSW 2052 Australia
Treatment of patients using high-quality precision medicine requires a thorough understanding of the genetic composition of a patient. Ideally, the identification of unique variations in an individual's genome is ... 详细信息
来源: 评论
High-Level synthesis of Approximate Designs under Real-Time Constraints
收藏 引用
ACM TRANSACTIONS ON EMBEDDED COMPUTING systemS 2019年 第5期18卷 59-59页
作者: Leipnitz, Marcos T. Nazar, Gabriel L. Univ Fed Rio Grande do Sul Informat Inst Av Bento Goncalves 9500 BR-91501970 Porto Alegre RS Brazil
The adoption of High-Level synthesis (HLS) has increased as the latest HLS tools have evolved to provide high-quality results while improving productivity and time-to-market. Concurrently, many works have been proposi... 详细信息
来源: 评论
Deriving Equations from Sensor Data Using Dimensional Function synthesis
收藏 引用
ACM TRANSACTIONS ON EMBEDDED COMPUTING systemS 2019年 第5期18卷 84-84页
作者: Wang, Youchao Willis, Sam Tsoutsouras, Vasileios Stanley-Marbell, Phillip Univ Cambridge 9 JJ Thomson Ave Cambridge CB3 0FA England
We present a new method for deriving functions that model the relationship between multiple signals in a physical system. The method, which we call dimensional function synthesis, applies to data streams where the dim... 详细信息
来源: 评论
Work-in-Progress: Furion: Alleviating Overheads for Deep Learning Framework On Single Machine
Work-in-Progress: Furion: Alleviating Overheads for Deep Lea...
收藏 引用
international conference on hardware/software codesign and system synthesis (CODES)
作者: Lihui Jin Chao Wang Lei Gong Chongchong Xu Yahui Hu Luchao Tan Xuehai Zhou University of Science and Technology of China
Deep learning has been successful at solving many kinds of tasks. hardware accelerators with high performance and parallelism have become mainstream to implement deep neural networks. In order to increase hardware uti... 详细信息
来源: 评论
Enhanced Resilient Sensor Attack Detection Using Fusion Interval and Measurement History  18
Enhanced Resilient Sensor Attack Detection Using Fusion Inte...
收藏 引用
international conference on hardware/software codesign and system synthesis (CODES)
作者: Kang Yang Rui Wang Yu Jiang Chenxia Luo Yong Guan Xiaojuan Li Zhiping Shi College of Information Engineering Capital Normal University Beijing China School of Software Tsinghua University Beijing China
For the Cyber-Physical systems which are equipped with multiple sensors that measure the same physical variables, some of the sensors may be subject to malicious attacks and provide the wrong measurements to the contr... 详细信息
来源: 评论