咨询与建议

限定检索结果

文献类型

  • 879 篇 会议
  • 11 篇 期刊文献

馆藏范围

  • 890 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 630 篇 工学
    • 549 篇 计算机科学与技术...
    • 434 篇 软件工程
    • 261 篇 电气工程
    • 261 篇 电子科学与技术(可...
    • 78 篇 机械工程
    • 48 篇 控制科学与工程
    • 35 篇 信息与通信工程
    • 31 篇 动力工程及工程热...
    • 15 篇 材料科学与工程(可...
    • 14 篇 冶金工程
    • 14 篇 生物工程
    • 11 篇 生物医学工程(可授...
    • 10 篇 仪器科学与技术
    • 10 篇 化学工程与技术
    • 8 篇 建筑学
    • 6 篇 光学工程
    • 5 篇 力学(可授工学、理...
    • 5 篇 土木工程
  • 283 篇 理学
    • 240 篇 数学
    • 47 篇 物理学
    • 38 篇 统计学(可授理学、...
    • 16 篇 系统科学
    • 14 篇 化学
    • 14 篇 生物学
  • 46 篇 管理学
    • 42 篇 管理科学与工程(可...
    • 17 篇 工商管理
    • 4 篇 图书情报与档案管...
  • 11 篇 法学
    • 9 篇 社会学
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 3 篇 农学
  • 2 篇 教育学
  • 2 篇 艺术学
  • 1 篇 医学

主题

  • 126 篇 computer aided d...
  • 82 篇 computer aided l...
  • 78 篇 computer science
  • 52 篇 computer archite...
  • 49 篇 timing
  • 41 篇 delay
  • 39 篇 permission
  • 37 篇 routing
  • 35 篇 very large scale...
  • 31 篇 circuit simulati...
  • 31 篇 integrated circu...
  • 30 篇 circuit testing
  • 30 篇 clocks
  • 30 篇 hardware
  • 27 篇 computational mo...
  • 27 篇 circuits
  • 26 篇 circuit faults
  • 25 篇 circuit synthesi...
  • 25 篇 energy consumpti...
  • 25 篇 algorithm design...

机构

  • 16 篇 computer science...
  • 8 篇 computer systems...
  • 8 篇 univ calif los a...
  • 7 篇 department of el...
  • 6 篇 department of el...
  • 5 篇 department of el...
  • 5 篇 school of comput...
  • 5 篇 beijing advanced...
  • 5 篇 stanford univ ca...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 school of integr...
  • 5 篇 computer science...
  • 5 篇 department of co...
  • 4 篇 ucla united stat...
  • 4 篇 univ of californ...
  • 4 篇 electrical and c...
  • 4 篇 department of el...
  • 4 篇 department of el...
  • 4 篇 synopsys inc. mo...

作者

  • 16 篇 cong jason
  • 14 篇 m. potkonjak
  • 9 篇 wong d.f.
  • 9 篇 m. sarrafzadeh
  • 8 篇 j. cong
  • 8 篇 d.f. wong
  • 7 篇 koh cheng-kok
  • 7 篇 c.l. liu
  • 7 篇 cheng chung-kuan
  • 7 篇 lim sung kyu
  • 6 篇 kahng andrew b.
  • 6 篇 anon
  • 6 篇 wong martin d.f.
  • 6 篇 sarrafzadeh maji...
  • 6 篇 d. kirovski
  • 5 篇 li peng
  • 5 篇 gang qu
  • 5 篇 gajski daniel d.
  • 5 篇 liu c.l.
  • 5 篇 potkonjak miodra...

语言

  • 845 篇 英文
  • 41 篇 其他
  • 4 篇 中文
检索条件"任意字段=IEEE/ACM International Conference on Computer Aide Digest"
890 条 记 录,以下是1-10 订阅
排序:
Shedding Light on LLMs: Harnessing Photonic Neural Networks for Accelerating LLMs  24
Shedding Light on LLMs: Harnessing Photonic Neural Networks ...
收藏 引用
43rd international conference on computer-aided Design, ICCAD 2024
作者: Afifi, Salma Pasricha, Sudeep Nikdast, Mahdi Department of Electrical and Computer Engineering Colorado State University Fort CollinsCO United States
Large language models (LLMs) are foundational to the advancement of state-of-the-art natural language processing (NLP) and computer vision applications. However, their intricate architectures and the complexity of the... 详细信息
来源: 评论
Accelerating Fault Injection for Validating Processor RTL Implementations  24
Accelerating Fault Injection for Validating Processor RTL Im...
收藏 引用
43rd international conference on computer-aided Design, ICCAD 2024
作者: Yuan, Yi Chiou, Derek The University of Texas at Austin AustinTX United States Microsoft Corporation RedmondWA United States
With the increasing probability of software errors being caused by hardware transient faults, hardware engineers require better methods to evaluate the impact of faults and determine how to harden their products again... 详细信息
来源: 评论
Proceedings of the 43rd ieee/acm international conference on computer-aided Design, ICCAD 2024
Proceedings of the 43rd IEEE/ACM International Conference on...
收藏 引用
43rd international conference on computer-aided Design, ICCAD 2024
The proceedings contain 239 papers. The topics discussed include: exploration of timing and higher-energy attacks on quantum random access memory;fortifying the NAND flash supply chain with innovative security primiti...
来源: 评论
Detecting Hardware Trojans in Manufactured Chips without Reference: A GMM-Based Approach  24
Detecting Hardware Trojans in Manufactured Chips without Ref...
收藏 引用
43rd international conference on computer-aided Design, ICCAD 2024
作者: Tahghigh, Mahsa Salmani, Hassan Howard University WashingtonDC United States
The horizontal IC design and manufacturing flow creates ample opportunities for unauthorized tampering at various stages, yet there is limited research dedicated to detecting hardware Trojans (HTs) in manufactured ICs... 详细信息
来源: 评论
MapFormer: Attention-based multi-DNN Manager for Throughout & Power Co-Optimization on Embedded Devices  24
MapFormer: Attention-based multi-DNN Manager for Throughout ...
收藏 引用
43rd international conference on computer-aided Design, ICCAD 2024
作者: Karatzas, Andreas Anagnostopoulos, Iraklis School of Electrical Computer and Biomedical Engineering Southern Illinois University Carbondale United States
In the context of modern services that use multiple Deep Neural Networks (DNNs), managing workloads on embedded devices presents unique challenges. These devices often incorporate diverse architectures, necessitating ... 详细信息
来源: 评论
ALISA: An Adaptive Learned Index Structure for Spatial Data on Solid-State Drives  24
ALISA: An Adaptive Learned Index Structure for Spatial Data ...
收藏 引用
43rd international conference on computer-aided Design, ICCAD 2024
作者: Lin, Che-Wei Wu, Chun-Feng Department of Computer Science National Yang Ming Chiao Tung University Taiwan
Spatial learned index is becoming popular as a solution to relieve the intense storage demands and high I/O costs of spatial databases. LISA, the original and most prominent spatial learned index structure, is tailore... 详细信息
来源: 评论
Invited Paper: Enhancing Privacy-Preserving Computing with Optimized CKKS Encryption: A Hardware Acceleration Approach  24
Invited Paper: Enhancing Privacy-Preserving Computing with O...
收藏 引用
43rd international conference on computer-aided Design, ICCAD 2024
作者: Bao, Tianyou He, Pengzhou Xie, Jiafeng Department of Electrical and Computer Engineering Villanova University VillanovaPA19085 United States
The widespread adoption of the FHE (Fully Homomorphic Encryption) CKKS (Cheon-Kim-Kim-Song) encryption algorithm is stunted by its slow software implementation, driving the need for efficient hardware acceleration sol... 详细信息
来源: 评论
RareLS: Rarity-Reducing Logic Synthesis for Mitigating Hardware Trojan Threats  24
RareLS: Rarity-Reducing Logic Synthesis for Mitigating Hardw...
收藏 引用
43rd international conference on computer-aided Design, ICCAD 2024
作者: Meng, Chang Yu, Mingfei Wang, Hanyu Burleson, Wayne De Micheli, Giovanni EPFL Lausanne Switzerland ETH Zurich Zurich Switzerland University of Massachusetts Amherst United States
Hardware Trojan (HT) poses a critical security threat to integrated circuits, which can change circuit functionality or leak sensitive data. HTs are typically activated under low-probability conditions by exploiting &... 详细信息
来源: 评论
SMT-based Layout Synthesis for Silicon-based Quantum Computing with Crossbar Architecture  24
SMT-based Layout Synthesis for Silicon-based Quantum Computi...
收藏 引用
43rd international conference on computer-aided Design, ICCAD 2024
作者: Huang, Sheng-Tan Jiang, Ying-Jie Fang, Shao-Yun Cheng, Chung-Kuan Department of Electrical Engineering National Taiwan University of Science and Technology Taiwan Department of Computer Science and Engineering University of California San Diego United States
With the announcement of the most advanced silicon spin quantum-bit (qubit) chip by Intel, silicon-based quantum circuit manufacturing technology has shown the superior potential to realize quantum computing to other ... 详细信息
来源: 评论
Hardware-Aware Quantization for Accurate Memristor-Based Neural Networks  24
Hardware-Aware Quantization for Accurate Memristor-Based Neu...
收藏 引用
43rd international conference on computer-aided Design, ICCAD 2024
作者: Diware, Sumit Yaldagard, Mohammad Amin Bishnoi, Rajendra Computer Engineering Lab Delft University of Technology Delft Netherlands
Memristor-based Computation-In-Memory (CIM) has emerged as a compelling paradigm for designing energy-efficient neural network hardware. However, memristors suffer from conductance variation issue, which introduces co... 详细信息
来源: 评论