期刊: ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2021; 20 (3)
Some signal processing and multimedia applications can be specified by synchronous dataflow (SDF) models. The problem of SDF mapping to a given set of......
期刊: ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2021; 20 (2)
The investigation in this article makes the following important contributions to combinatorial optimization of computation offloading in fog computing......
期刊: ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2021; 20 (4)
Hardware Trojan (HT) is a major threat to the security of integrated circuits (ICs). Among various HT detection approaches, side channel analysis (SCA......
期刊: ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2021; 20 (1)
Hardware Trojans (HTs) have become a major threat for the integrated circuit industry and supply chain and have motivated numerous developments of HT ......
期刊: ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2020; 18 (6)
With the rapid growth of connectivity and autonomy for today's automobiles, their security vulnerabilities are becoming one of the most urgent concern......
期刊: ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2020; 18 (6)
Rapidly evolving technologies and applications of mobile devices inevitably increase the power demands on the battery. However, the development of bat......
期刊: ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2020; 18 (6)
Continuous technology scaling in manycore systems leads to severe overheating issues. To guarantee system reliability, it is critical to accurately ye......
期刊: ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2020; 19 (1)
Code-reuse attack is a concrete threat to computing systems because it can evade conventional security defenses. Control flow integrity (CFI) is propo......
期刊: ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2020; 19 (1)
Heterogeneous multicore processors have recently become de facto computing engines for state-of-the-art embedded applications. Nonetheless, very littl......
期刊: ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2020; 19 (2)
Stereo matching is a promising approach for smart vehicles to find the depth of nearby objects. Transforming a traditional stereo matching algorithm t......
期刊: ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2020; 19 (3)
For traditional public key cryptography and post-quantum cryptography, such as elliptic curve cryptography and supersingular isogeny key encapsulation......
期刊: ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2020; 19 (3)
Video object detection and action recognition typically require deep neural networks (DNNs) with huge number of parameters. It is thereby challenging ......
期刊: ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2020; 19 (4)
Static random access memory- (SRAM) based field programmable gate arrays (FPGAs) are currently facing challenges of limited capacity and high leakage ......
期刊: ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2020; 19 (4)
Mobile edge computing (MEC) is becoming a promising paradigm of providing computing servers, like cloud computing, to Edge node. Compared to cloud ser......
期刊: ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2020; 19 (6)
This article tackles the problem of detecting and solving potential conflicts among independently developed apps that are to be installed into an open......