nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
ACDS—Assisted Cooperative Decision-Support for reliable interaction based navigation assistance for autonomous vehicles
|
Amudha, G |
|
|
87 |
C |
p. |
artikel |
2 |
Achieving cost-efficient fail-operational behavior based on inherent redundancy at the system level
|
Dörr, Tobias |
|
|
87 |
C |
p. |
artikel |
3 |
A low power and real-time hardware recurrent neural network for time series analysis on wearable devices
|
Torti, Emanuele |
|
|
87 |
C |
p. |
artikel |
4 |
Analysis of early warning of corporate financial risk via deep learning artificial neural network
|
Feng, Qi |
|
|
87 |
C |
p. |
artikel |
5 |
An EEG emotion recognition method based on transfer learning and echo state network for HilCPS
|
Zhou, Jian |
|
|
87 |
C |
p. |
artikel |
6 |
A scalable and efficient convolutional neural network accelerator using HLS for a system-on-chip design
|
Bjerge, Kim |
|
|
87 |
C |
p. |
artikel |
7 |
A security and authentication layer for SCADA/DCS applications
|
Homay, Aydin |
|
|
87 |
C |
p. |
artikel |
8 |
A systematic approach to analysis for assessing the security level of cyber-physical systems in the electricity sector
|
Sánchez Rodríguez, Miguel Ángel |
|
|
87 |
C |
p. |
artikel |
9 |
Automated book location and classification method using RFID tags for smart libraries
|
Yaman, Orhan |
|
|
87 |
C |
p. |
artikel |
10 |
BCNN: Binary complex neural network
|
Li, Yanfei |
|
|
87 |
C |
p. |
artikel |
11 |
Cost-aware reliability task scheduling of automotive cyber-physical systems
|
Tang, Yuqing |
|
|
87 |
C |
p. |
artikel |
12 |
Deep learning side-channel attack against hardware implementations of AES
|
Kubota, Takaya |
|
|
87 |
C |
p. |
artikel |
13 |
Design and management of image processing pipelines within CPS: Acquired experience towards the end of the FitOptiVis ECSEL Project
|
Sau, Carlo |
|
|
87 |
C |
p. |
artikel |
14 |
Development of optimized memory based VLSI architecture with histogram analysis for image contrast enhancement
|
Koteswar Rao, Bonagiri |
|
|
87 |
C |
p. |
artikel |
15 |
DGA: Distributed geographic-sensing addressing method for linear-zone internet of things
|
Luo, Haibo |
|
|
87 |
C |
p. |
artikel |
16 |
2-D Systolic Array architecture of CBNS based Discrete Hilbert Transform Processor
|
Mukherjee, Madhumita |
|
|
87 |
C |
p. |
artikel |
17 |
Edge computing and machinery automation application for intelligent manufacturing equipment
|
Zhou, Lianyang |
|
|
87 |
C |
p. |
artikel |
18 |
Editorial Board
|
|
|
|
87 |
C |
p. |
artikel |
19 |
Energy-aware fixed priority scheduling with shared resources in standby-sparing systems
|
Zhang, Yi-Wen |
|
|
87 |
C |
p. |
artikel |
20 |
Experimental evaluation of a Software-Defined Radio through a Breast Phantom aiming at Microwave Medical Imaging
|
Carvalho, Dionísio |
|
|
87 |
C |
p. |
artikel |
21 |
Exploring a Hybrid Voting-based Eviction Policy for Caches and Sparse Directories on Manycore Architectures
|
Srivatsa, Akshay |
|
|
87 |
C |
p. |
artikel |
22 |
FPGA implementation of bearing tracking using passive array for underwater acoustics
|
Çavuşlu, Mehmet Ali |
|
|
87 |
C |
p. |
artikel |
23 |
Ground object information extraction from hyperspectral remote sensing images using deep learning algorithm
|
Wang, Zhengyang |
|
|
87 |
C |
p. |
artikel |
24 |
Highly-accurate binary tiny neural network for low-power human activity recognition
|
De Vita, Antonio |
|
|
87 |
C |
p. |
artikel |
25 |
Highly reliable XoR Feed Arbiter Physical Unclonable Function (XFAPUF) in 180 nm process for IoT security
|
Podeti, Raveendra |
|
|
87 |
C |
p. |
artikel |
26 |
High performance and energy efficient sobel edge detection
|
Peng-o, Thaufig |
|
|
87 |
C |
p. |
artikel |
27 |
High throughput and energy efficient linear phase FIR filter architectures
|
Patali, Pramod |
|
|
87 |
C |
p. |
artikel |
28 |
IoT-enabled computer vision-based parts inspection system for SME 4.0
|
Ullah, Ubaid |
|
|
87 |
C |
p. |
artikel |
29 |
Key technologies for safe and autonomous drones
|
Hussein, Mahmoud |
|
|
87 |
C |
p. |
artikel |
30 |
Leakage free helper data storage in microcontroller based PUF implementation
|
Laban, Marek |
|
|
87 |
C |
p. |
artikel |
31 |
LPNet: A DNN based latency prediction technique for application mapping in Network-on-Chip design
|
Sambangi, Ramesh |
|
|
87 |
C |
p. |
artikel |
32 |
Memory Efficient Hardware Architecture for 5/3 Lifting-Based 2-D Forward Discrete Wavelet Transform
|
Savić, Assist. Prof. Dr. Goran |
|
|
87 |
C |
p. |
artikel |
33 |
Mobile link prediction: Automated creation and crowdsourced validation of knowledge graphs
|
Ballandies, Mark C. |
|
|
87 |
C |
p. |
artikel |
34 |
Model-based configuration of access protection units for multicore processors in embedded systems
|
Dörr, Tobias |
|
|
87 |
C |
p. |
artikel |
35 |
Model-Based Design Space Exploration for FPGA-based Image Processing Applications Employing Parameterizable Approximations
|
Conrady, Simon |
|
|
87 |
C |
p. |
artikel |
36 |
Multi-resource scheduling for FPGA systems
|
Bertolino, Matteo |
|
|
87 |
C |
p. |
artikel |
37 |
Performance modeling of heterogeneous HW platforms
|
Rehm, Falk |
|
|
87 |
C |
p. |
artikel |
38 |
Post-quantum cryptography for automotive systems
|
Fritzmann, Tim |
|
|
87 |
C |
p. |
artikel |
39 |
Protection switching schemes and mapping strategies for fail-operational hard real-time NoCs
|
Koenen, Max |
|
|
87 |
C |
p. |
artikel |
40 |
Safe and secure software updates on high-performance mixed-criticality systems: The UP2DATE approach
|
Agirre, Irune |
|
|
87 |
C |
p. |
artikel |
41 |
Sensitivity of HfO2-based RRAM Cells to Laser Irradiation
|
Petryk, Dmytro |
|
|
87 |
C |
p. |
artikel |
42 |
SHA2 and SHA-3 accelerator design in a 7 nm technology within the European Processor Initiative
|
Nannipieri, Pietro |
|
|
87 |
C |
p. |
artikel |
43 |
The application of the methodology for secure cyber–physical systems design to improve the semi-natural model of the railway infrastructure
|
Levshun, Dmitry |
|
|
87 |
C |
p. |
artikel |
44 |
The VALU3S ECSEL project: Verification and validation of automated systems safety and security
|
Agirre, J.A. |
|
|
87 |
C |
p. |
artikel |
45 |
TRESC: Towards redesigning existing symmetric ciphers
|
Noura, Hassan N. |
|
|
87 |
C |
p. |
artikel |
46 |
Water body segmentation of Synthetic Aperture Radar image using Deep Convolutional Neural Networks
|
Lalchhanhima, R. |
|
|
87 |
C |
p. |
artikel |