TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
5 | |
5G-Enabled Vehicular Networks | |
6 | |
6T SRAM cell | |
A | |
adabins | |
adaptive array | |
address-bit attacks | |
AES Encryption | |
AFTAB | |
aging | |
Airtime | |
Ampere-hour integration | |
analysis | |
anomaly detection algorithms | |
approximating expressions | |
Arduino | |
area | |
Artificial Intelligence | |
ASIC | |
atomic patterns | |
atomicity principle | |
Auricularia fungus | |
B | |
bandgap reference | |
Bandwidth | |
Battery management system | |
beam constraint | |
behavior verification | |
benchmark circuits | |
BIST Engine | |
bit recoding matrix | |
breast cancer | |
C | |
calculation | |
Cargo | |
Centroid Tracker | |
CEZ | |
Ciphertext | |
climate change | |
clock tree | |
CNN | |
composition of distribution laws | |
computer performance | |
cone | |
Congestion-Aware Routing | |
contrast | |
coverage factor | |
crosstalk | |
crosstalk prediction | |
CTLE | |
Custom Instruction | |
Customs | |
D | |
data aggregation | |
data preprocessing | |
data sampling | |
Data security | |
Database | |
dataset quality | |
decision tree | |
Decision-making | |
Decryption | |
deductive matrix | |
deductive matrix vector synthesis | |
deductive vector | |
deep learning | |
defect coverage | |
defect estimation | |
defect simulation | |
defects | |
Dependability analysis | |
depth map | |
Design Automation | |
Design Flow | |
digital assisted analog | |
Digital System | |
distributed data storage systems | |
DPPM | |
Duty Cycle | |
E | |
EC point multiplication | |
electromigration | |
Elliptic curve cryptography | |
Elliptic Curve Cryptography (ECC) | |
embedded systems | |
Encryption | |
Environmental health | |
Export | |
F | |
fault as address simulation | |
fault coverage | |
Fault Injection Framework | |
Fault Simulation | |
fault truth table | |
faults | |
field | |
filtering | |
Fire Detection | |
floorplan | |
Fog and edge computing networks | |
foldback current limiting | |
forced air heat sink | |
FPGA | |
FPGA-based Tester | |
frame sequence | |
FSRCNN | |
Functional Verification | |
G | |
Gamma ray | |
genetic placement algorithm | |
GNSS | |
Greenhouse gas | |
H | |
hardware acceleration | |
hardware prefetching | |
HDL description | |
health monitoring | |
Heterogeneous Networks | |
High-level Design | |
histological image | |
horizontal attacks | |
hybrid architecture | |
Hyper-parameter tuning | |
I | |
identification of states and neighborhoods of behavior | |
IGBT | |
image enhancement | |
In-memory big data as address computing | |
in-memory computing | |
Informative Systems | |
input binary set | |
integral equations | |
Integrated Circuit | |
integrated circuits | |
IO cell | |
IR drop | |
K | |
kalman filter | |
Keyword | |
kP | |
L | |
layout | |
linear constraint | |
logic vectors | |
Logical vector | |
logistic regression | |
LoRaWAN | |
M | |
m-Health | |
machine learning | |
mammograms | |
matrix approach | |
Melanized fungi | |
memory array | |
memory latency | |
Metamaterial-based Low pass filter | |
metric | |
Microcontroller | |
Microelectronic Circuits | |
midas | |
model | |
modeling smart data structures | |
Monte Carlo Method | |
multi-memory bus | |
Multiport SRAM | |
N | |
Neg-C | |
network security | |
neural network | |
neural networks | |
noise | |
O | |
object | |
Open circuit voltage | |
optical flow | |
optimization | |
P | |
pandemic | |
parameter tuning | |
Pattern | |
patters | |
Payload | |
pcb | |
performance | |
physical design | |
physical losses in solar panels | |
placement of integrated circuit cells | |
power and current consumption | |
power consumption | |
power electronic module | |
power semiconductor reliability | |
power supply network | |
Preamble | |
precision analog | |
prediction | |
prefetching scheme | |
Public key cryptosystem | |
PV cell | |
Python | |
Q | |
Q-learning | |
QR-codes | |
quadratic assignment problem | |
R | |
Radiosynthesis | |
Randomization | |
Read-write transaction | |
read-write transactions | |
read-write transactions on logic vectors | |
read/write delay | |
regression | |
Reinforcement learning | |
reliability | |
rendering | |
RISC-V | |
RISC-V processor | |
RLS algorithm | |
Robotics | |
RSA algorithm | |
S | |
scene | |
self-heating | |
SerDes | |
service-oriented architecture | |
SF | |
Side-channel Analysis (SCA) | |
signal integrity | |
simple power analysis (SPA) | |
Simulation | |
singular | |
skew | |
slots | |
Smart data structure | |
smart data structures | |
Smoke Detection | |
soft-processor | |
Software-Defined Network | |
solar energy | |
solar panel modeling | |
SPI | |
Split Ring Resonator (SRR) | |
SSIM | |
State of charge | |
Student’s distribution | |
System on chip | |
SystemC | |
T | |
TDDB | |
technological node | |
temperature coefficient | |
temperature gradient | |
Terahertz | |
test | |
textures | |
top level | |
topographic map-based segmentation | |
truth table | |
tuning genetic algorithms | |
U | |
UART | |
Universal Verification Methodology (UVM) | |
UVM | |
V | |
V2V communication | |
validation | |
vector-table deductive fault simulation | |
Vehicle Speed Detection | |
verification and forecasting models | |
Verification methodologies | |
visual odometry | |
visualization | |
VLSI | |
voltage regulator | |
W | |
weight constraint | |
wireless sensor network | |
X | |
X-ray | |
Y | |
YOLOv5 | |
YOLOv7 | |
Z | |
zoedepth |