


default search action
IEEE Transactions on Emerging Topics in Computing, Volume 11
Volume 11, Number 1, January - March 2023
- Davide Conficconi
, Emanuele Del Sozzo
, Filippo Carloni
, Alessandro Comodi, Alberto Scolari, Marco Domenico Santambrogio:
An Energy-Efficient Domain-Specific Architecture for Regular Expressions. 3-17 - Takahiro Ohyama
, Yuichi Kawamoto
, Nei Kato
:
Quantum Computing Based Optimization for Intelligent Reflecting Surface (IRS)-Aided Cell-Free Network. 18-29 - Yuechen Chen
, Shanshan Liu
, Fabrizio Lombardi
, Ahmed Louri:
A Technique for Approximate Communication in Network-on-Chips for Image Classification. 30-42 - Arash Salahvarzi
, Mohsen Khosroanjam, Amir Mahdi Hosseini Monazzah
, Hakem Beitollahi
, Ümit Y. Ogras
, Mahdi Fazeli
:
WiSE: When Learning Assists Resolving STT-MRAM Efficiency Challenges. 43-55 - Rafael Herrero-Álvarez
, Gara Miranda
, Coromoto León
, Eduardo Segredo
:
Engaging Primary and Secondary School Students in Computer Science Through Computational Thinking Training. 56-69 - Mario Barbareschi
, Salvatore Barone
, Nicola Mazzocca, Alberto Moriconi
:
A Catalog-Based AIG-Rewriting Approach to the Design of Approximate Components. 70-81 - Dong-Ok Won
, Yong-Nam Jang
, Seong-Whan Lee
:
PlausMal-GAN: Plausible Malware Training Based on Generative Adversarial Networks for Analogous Zero-Day Malware Detection. 82-94 - Yun-Shan Hsieh
, Po-Chun Huang
, Yuan-Hao Chang
, Bo-Jun Chen, Wang Kang
, Wei-Kuan Shih
:
Granularity-Driven Management for Reliable and Efficient Skyrmion Racetrack Memories. 95-111 - Ourania Spantidi
, Georgios Zervakis
, Sami Alsalamin
, Isai Roman-Ballesteros
, Jörg Henkel
, Hussam Amrouch
, Iraklis Anagnostopoulos
:
Targeting DNN Inference Via Efficient Utilization of Heterogeneous Precision DNN Accelerators. 112-125 - Abdelatif Hafid, Abdelhakim Senhaji Hafid, Mustapha Samih:
A Tractable Probabilistic Approach to Analyze Sybil Attacks in Sharding-Based Blockchain Protocols. 126-136 - Javier Rojo
, Lara Guedes de Pinho
, César Fonseca
, Manuel José Lopes, Sumi Helal, Juan Hernández, José García-Alonso
, Juan Manuel Murillo
:
Analyzing the Performance of Feature Selection on Regression Problems: A Case Study on Older Adults' Functional Profile. 137-152 - Mingfu Xue
, Chengxiang Yuan, Can He
, Yinghao Wu, Zhiyu Wu, Yushu Zhang
, Zhe Liu
, Weiqiang Liu
:
Use the Spear as a Shield: An Adversarial Example Based Privacy-Preserving Technique Against Membership Inference Attacks. 153-169 - Davide Gadioli
, Emanuele Vitali, Federico Ficarelli
, Chiara Latini, Candida Manelfi, Carmine Talarico
, Cristina Silvano
, Carlo Cavazzoni, Gianluca Palermo
, Andrea Rosario Beccari:
EXSCALATE: An Extreme-Scale Virtual Screening Platform for Drug Discovery Targeting Polypharmacology to Fight SARS-CoV-2. 170-181 - Tinghui Wang
, Diane J. Cook
, Thomas R. Fischer:
The Indoor Predictability of Human Mobility: Estimating Mobility With Smart Home Sensors. 182-193 - Xiangye Wei
, Liming Xiu
:
A VLSI Digital Circuit Platform for Performing Deterministic Stochastic Computing in the Time Dimension Using Fraction Operations on Rational Numbers. 194-207 - Eeshan Gupta, Shamik Sural
, Jaideep Vaidya
, Vijayalakshmi Atluri
:
Enabling Attribute-Based Access Control in NoSQL Databases. 208-223 - Takuya Edamatsu
, Daisuke Takahashi
:
Fast Multiple-Precision Integer Division Using Intel AVX-512. 224-236 - Yanhua Liu
, Zhihuang Liu
, Ximeng Liu
, Wenzhong Guo
:
A Web Back-End Database Leakage Incident Reconstruction Framework Over Unlabeled Logs. 237-252 - Zhibo Li, Yurong Qian, Fengxiao Tang
, Ming Zhao
, Yusen Zhu:
H-BILSTM: A Novel Bidirectional Long Short Term Memory Network Based Intelligent Early Warning Scheme in Mobile Edge Computing (MEC). 253-264 - Yuqin Dou
, Chongyan Gu
, Chenghua Wang, Weiqiang Liu
, Fabrizio Lombardi
:
Security and Approximation: Vulnerabilities in Approximation-Aware Testing. 265-271
Volume 11, Number 2, April - June 2023
- Yuan-Hao Chang
, Vincenzo Piuri
:
Guest Editorial: IEEE Transactions on Emerging Topics in Computing Thematic Section on Memory- Centric Designs: Processing-in-Memory, In-Memory Computing, and Near-Memory Computing for Real-World Applications. 278-280 - Andrew Ding
, Ye Qiao
, Nader Bagherzadeh
:
BNN An Ideal Architecture for Acceleration With Resistive in Memory Computation. 281-291 - Siming Ma
, David Brooks, Gu-Yeon Wei:
A Binary-Activation, Multi-Level Weight RNN and Training Algorithm for ADC-/DAC-Free and Noise-Resilient Processing-in-Memory Inference With eNVM. 292-302 - Biresh Kumar Joardar
, Janardhan Rao Doppa
, Hai (Helen) Li
, Krishnendu Chakrabarty
, Partha Pratim Pande
:
ReaLPrune: ReRAM Crossbar-Aware Lottery Ticket Pruning for CNNs. 303-317 - Yueting Li
, Tianshuo Bai
, Xinyi Xu, Yundong Zhang, Bi Wu
, Hao Cai
, Biao Pan
, Weisheng Zhao
:
A Survey of MRAM-Centric Computing: From Near Memory to In Memory. 318-330 - Bi Wu
, Haonan Zhu
, Dayane Reis
, Zhaohao Wang
, Ying Wang
, Ke Chen
, Weiqiang Liu
, Fabrizio Lombardi
, Xiaobo Sharon Hu
:
An Energy-Efficient Computing-in-Memory (CiM) Scheme Using Field-Free Spin-Orbit Torque (SOT) Magnetic RAMs. 331-342 - Mousam Hossain
, Adrian Tatulian
, Shadi Sheikhfaal
, Harshavardhan Reddy Thummala
, Ronald F. DeMara
:
Scalable Reasoning and Sensing Using Processing-In-Memory With Hybrid Spin/CMOS-Based Analog/Digital Blocks. 343-357 - Marco Rios
, Flavio Ponzina
, Alexandre Levisse
, Giovanni Ansaloni
, David Atienza
:
Bit-Line Computing for CNN Accelerators Co-Design in Edge AI Inference. 358-372 - Adarsha Balaji
, Phu Khanh Huynh, Francky Catthoor
, Nikil D. Dutt
, Jeffrey L. Krichmar
, Anup Das
:
NeuSB: A Scalable Interconnect Architecture for Spiking Neuromorphic Hardware. 373-387 - Nika Mansouri-Ghiasi
, Nandita Vijaykumar, Geraldo F. Oliveira
, Lois Orosa
, Ivan Fernandez
, Mohammad Sadrosadati
, Konstantinos Kanellopoulos, Nastaran Hajinazar, Juan Gómez-Luna
, Onur Mutlu
:
ALP: Alleviating CPU-Memory Data Movement Overheads in Memory-Centric Systems. 388-403 - Weikang Qiao
, Licheng Guo, Zhenman Fang
, Mau-Chung Frank Chang
, Jason Cong
:
TopSort: A High-Performance Two-Phase Sorting Accelerator Optimized on HBM-Based FPGAs. 404-419 - George Papadimitriou
, Dimitris Gizopoulos
:
Anatomy of On-Chip Memory Hardware Fault Effects Across the Layers. 420-431 - Sidhartha Sankar Rout
, Badri M, Mitali Sinha
, Sujay Deb
:
ReDeSIGN: Reuse of Debug Structures for Improvement in Performance Gain of NoC Based MPSoCs. 432-447 - Xiubin Zhu
, Dan Wang, Witold Pedrycz
, Zhiwu Li
:
Transfer Learning Realized With Nonlinearly Transformed Input Space. 448-460 - Muhammad Awais Hussain
, Shih-An Huang, Tsung-Han Tsai
:
Learning With Sharing: An Edge-Optimized Incremental Learning Method for Deep Neural Networks. 461-473 - Siladittya Manna
, Dipayan Das
, Saumik Bhattacharya
, Umapada Pal
, Sukalpa Chanda
:
PLSM: A Parallelized Liquid State Machine for Unintentional Action Detection. 474-484 - Yang Bai
, Lixing Chen
, Jie Xu
:
NeuE: Automated Neural Network Ensembles for Edge Intelligence. 485-496 - Pantea Kiaei
, Thomas Conroy, Patrick Schaumont
:
Architecture Support for Bitslicing. 497-510 - Jianping Cai
, Ximeng Liu
, Zhiyong Yu
, Kun Guo
, Jiayin Li
:
Efficient Vertical Federated Learning Method for Ridge Regression of Large-Scale Samples. 511-526 - Milad Tanavardi Nasab
, Abdolah Amirany
, Mohammad Hossein Moaiyeri
, Kian Jafari
:
High-Performance and Robust Spintronic/CNTFET-Based Binarized Neural Network Hardware Accelerator. 527-533 - Shadi Sheikhfaal
, Shaahin Angizi
, Ronald F. DeMara
:
Energy-Efficient Recurrent Neural Network With MRAM-Based Probabilistic Activation Functions. 534-540 - Swetaki Chatterjee
, Nikhil Rangarajan
, Satwik Patnaik
, Dinesh Rajasekharan
, Ozgur Sinanoglu
, Yogesh Singh Chauhan
:
FerroCoin: Ferroelectric Tunnel Junction-Based True Random Number Generator. 541-547
Volume 11, Number 3, July - September 2023
- Michael Grottke
, Alberto Avritzer, Hironori Washizaki, Kishor S. Trivedi:
Guest Editorial Special Section on Applied Software Aging and Rejuvenation. 550-552 - Mateus Schulz Nogueira
, Erica da Cunha Ferreira
, Pedro Tubenchlak Boechat
, Felipe Assis
, Estevão Rabello Ussler
, Rafael Rodrigo Furtado do Nascimento, Daniel Sadoc Menasché
, Geraldo Xexéo
, Abhishek Ramchandran
, Katinka Wolter
:
A Large Scale Characterization of Device Uptimes. 553-565 - Fangyun Qin
, Zheng Zheng
, Xiaohui Wan
, Zhihao Liu
, Zhiping Shi
:
Predicting Aging-Related Bugs Using Network Analysis on Aging-Related Dependency Networks. 566-579 - Kai Jia
, Xiao Yu
, Chen Zhang, Wenhua Hu, Dongdong Zhao
, Jianwen Xiang
:
Software Aging Prediction for Cloud Services Using a Gate Recurrent Unit Neural Network Model Based on Time Series Decomposition. 580-593 - Raffaele Romagnoli
, Bruce H. Krogh
, Dionisio de Niz
, Anton Dimov Hristozov
, Bruno Sinopoli
:
Runtime System Support for CPS Software Rejuvenation. 594-604 - Zihui Yan
, Cong Liang
, Huaming Wu
:
A Segmented-Edit Error-Correcting Code With Re-Synchronization Function for DNA-Based Storage Systems. 605-618 - Shuo-Han Chen
, Kuo-Hao Huang:
Leveraging Journaling File System for Prompt Secure Deletion on Interlaced Recording Drives. 619-634 - Licia Amichi
, Aline Carneiro Viana, Mark Crovella
, Antonio Alfredo Ferreira Loureiro
:
Revealing an Inherently Limiting Factor in Human Mobility Prediction. 635-649 - Jiho Kim
, Tae-Hwan Kim
:
ROSETTA: A Resource and Energy-Efficient Inference Processor for Recurrent Neural Networks Based on Programmable Data Formats and Fine Activation Pruning. 650-663 - Mingfu Xue
, Zhiyu Wu, Yushu Zhang
, Jian Wang, Weiqiang Liu
:
AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption. 664-678 - Umberto Garlando
, Qi Wang, Oleksandr V. Dobrovolskiy
, Andrii V. Chumak
, Fabrizio Riente
:
Numerical Model for 32-Bit Magnonic Ripple Carry Adder. 679-688 - Kleanthis Papachatzopoulos
, Vassilis Paliouras
:
Path-Based Delay Variation Models for Parallel-Prefix Adders. 689-705 - Zheyi Chen
, Pu Tian
, Weixian Liao
, Xuhui Chen
, Guobin Xu
, Wei Yu
:
Resource-Aware Knowledge Distillation for Federated Learning. 706-719 - Orian Leitersdorf, Dean Leitersdorf, Jonathan Gal, Mor M. Dahan, Ronny Ronen, Shahar Kvatinsky:
AritPIM: High-Throughput In-Memory Arithmetic. 720-735 - Nima Eslami
, Mohammad Hossein Moaiyeri
:
A Flexible and Reliable RRAM-Based In-Memory Computing Architecture for Data-Intensive Applications. 736-748 - Honggui Han
, Xing Bai
, Hongyan Yang
, Ying Hou
, Junfei Qiao
:
Multitask Particle Swarm Optimization With Dynamic Transformation. 749-763 - Seong-Joon Park
, Hosung Park
, Heeyoul Kwak
, Jong-Seon No
:
BIC Codes: Bit Insertion-Based Constrained Codes With Error Correction for DNA Storage. 764-777 - Xiaoheng Deng
, Jiahao Zhao
, Zhufang Kuang
, Xuechen Chen
, Qi Guo
, Fengxiao Tang
:
Computation Efficiency Maximization in Multi-UAV-Enabled Mobile Edge Computing Systems Based on 3D Deployment Optimization. 778-790 - Alvaro Cintas Canto
, Ausmita Sarker
, Jasmin Kaur, Mehran Mozaffari Kermani
, Reza Azarderakhsh
:
Error Detection Schemes Assessed on FPGA for Multipliers in Lattice-Based Key Encapsulation Mechanisms in Post-Quantum Cryptography. 791-797 - Pedro Reviriego
, Salvatore Pontarelli
, Jorge Martínez:
Bitwise Signature Comparison: Enabling More Efficient Similarity Estimation. 798-804 - Mariam Rakka
, Mohammed E. Fouda
, Rouwaida Kanj
, Fadi J. Kurdahi
:
DT2CAM: A Decision Tree to Content Addressable Memory Framework. 805-810 - Hyoju Seo
, Yongtae Kim
:
A Low Latency Approximate Adder Design Based on Dual Sub-Adders With Error Recovery. 811-816 - Karim Shahbazi
, Seok-Bum Ko
:
An Optimized Hardware Implementation of Modular Multiplication of Binary Ring LWE. 817-821
Volume 11, Number 4, October - December 2023
- Guangyan Li
, Donglong Chen
, Gaoyu Mao
, Wangchen Dai
, Abdurrashid Ibrahim Sanka
, Ray C. C. Cheung
:
Algorithm-Hardware Co-Design of Split-Radix Discrete Galois Transformation for KyberKEM. 824-838 - Florenc Demrozi
, Cristian Turetta
, Philipp H. Kindt
, Fabio Chiarani
, Ruggero Angelo Bacchin
, Nicola Valè
, Francesco Pascucci
, Paola Cesari
, Nicola Smania
, Stefano Tamburin
, Graziano Pravadelli
:
A Low-Cost Wireless Body Area Network for Human Activity Recognition in Healthy Life and Medical Applications. 839-850 - Ali Akbar Bahoo
, Omid Akbari
, Muhammad Shafique
:
An Energy-Efficient Generic Accuracy Configurable Multiplier Based on Block-Level Voltage Overscaling. 851-867 - Alvaro Ayuso-Martinez
, Daniel Casanueva-Morato
, Juan Pedro Dominguez-Morales
, Angel Jiménez-Fernandez
, Gabriel Jiménez-Moreno
:
Construction of a Spike-Based Memory Using Neural-Like Logic Gates Based on Spiking Neural Networks on SpiNNaker. 868-881 - A. Alper Goksoy
, Guihong Li
, Sumit K. Mandal
, Ümit Y. Ogras
, Radu Marculescu
:
CANNON: Communication-Aware Sparse Neural Network Optimization. 882-894 - Paria Darbani
, Hakem Beitollahi
, Pejman Lotfi-Kamran
:
Rei: A Reconfigurable Interconnection Unit for Array-Based CNN Accelerators. 895-906 - Di Wu
, Yi He
, Xin Luo
:
A Graph-Incorporated Latent Factor Analysis Model for High-Dimensional and Sparse Data. 907-917 - Jim Plusquellic
, Eirini-Eleni Tsiropoulou
, Cyrus Minwalla:
Privacy-Preserving Authentication Protocols for IoT Devices Using the SiRF PUF. 918-933 - Yu-Wei Chang
, Hong-Yen Chen
, Chansu Han
, Tomohiro Morikawa
, Takeshi Takahashi
, Tsung-Nan Lin
:
FINISH: Efficient and Scalable NMF-Based Federated Learning for Detecting Malware Activities. 934-949 - Takahiro Ohyama
, Yuichi Kawamoto
, Nei Kato
:
Resource Allocation Optimization by Quantum Computing for Shared Use of Standalone IRS. 950-961 - Shaahin Angizi
, Sepehr Tabrizchi
, David Z. Pan
, Arman Roohi
:
PISA: A Non-Volatile Processing-in-Sensor Accelerator for Imaging Systems. 962-972 - Xiaozhou Lu
, Sunghwan Kim
:
New Construction of Balanced Codes Based on Weights of Data for DNA Storage. 973-984 - Jun Zhou
, Masaaki Kondo
:
An Edge-Cloud Collaboration Framework for Graph Processing in Smart Society. 985-1001 - Kleanthis Papachatzopoulos
, Vassilis Paliouras
:
Noise-Shaping Binary-to-Stochastic Converters for Reduced-Length Bit-Streams. 1002-1017 - Gustavo Olague
, Roberto Pineda
, Gerardo Ibarra-Vázquez
, Matthieu Olague
, Axel Martinez
, Sambit Bakshi
, Jonathan Vargas
, Isnardo Reducindo
:
Adversarial Attacks Assessment of Salient Object Detection via Symbolic Learning. 1018-1030 - Abbas Dehghani
, Sadegh Fadaei
, Bahman Ravaei
, Keyvan RahimiZadeh
:
Deadline-Aware and Energy-Efficient Dynamic Task Mapping and Scheduling for Multicore Systems Based on Wireless Network-on-Chip. 1031-1044 - Huiwei Wang
, Yaqian Huang
, Huaqing Li
:
Quadtree-Based Adaptive Spatial Decomposition for Range Queries Under Local Differential Privacy. 1045-1056 - Chang Ruan
, Jianxin Wang
, Wanchun Jiang
, Tao Zhang
:
Scheduling Coflows by Online Identification in Data Center Network. 1057-1069 - Aibin Yan
, Aoran Cao
, Zhengfeng Huang
, Jie Cui
, Tianming Ni
, Patrick Girard
, Xiaoqing Wen
, Jiliang Zhang:
Two Double-Node-Upset-Hardened Flip-Flop Designs for High-Performance Applications. 1070-1081 - Sarad Venugopalan
, Ivana Stancíková
, Ivan Homoliak
:
Always on Voting: A Framework for Repetitive Voting on the Blockchain. 1082-1092

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.