ACM Transactions on Embedded Computing Systems

Papers
(The TQCC of ACM Transactions on Embedded Computing Systems is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-05-01 to 2024-05-01.)
ArticleCitations
Toward a Lingua Franca for Deterministic Concurrent Systems36
Edge-AI-Driven Framework with Efficient Mobile Network Design for Facial Expression Recognition35
TensorRT-Based Framework and Optimization Methodology for Deep Learning Inference on Jetson Boards29
MARS: mmWave-based Assistive Rehabilitation System for Smart Healthcare28
Game-Based Task Offloading of Multiple Mobile Devices with QoS in Mobile Edge Computing Systems of Limited Computation Capacity27
Heuristic Computation Offloading Algorithms for Mobile Users in Fog Computing26
Verifying the Safety of Autonomous Systems with Neural Network Controllers24
SIAM: Chiplet-based Scalable In-Memory Acceleration with Mesh for Deep Neural Networks24
Deep Ensemble Learning for Human Activity Recognition Using Wearable Sensors via Filter Activation23
Side-channel Analysis of Lattice-based Post-quantum Cryptography: Exploiting Polynomial Multiplication22
Distributed Task Offloading and Resource Purchasing in NOMA-Enabled Mobile Edge Computing: Hierarchical Game Theoretical Approaches21
Intermittent-Aware Neural Architecture Search19
LATTE: L STM Self- Att ention based Anomaly Detection in E mbedded Automotive Platforms18
Edge Intelligence: Concepts, Architectures, Applications, and Future Directions18
Algorithm-hardware Co-design of Attention Mechanism on FPGA Devices17
Reliability-aware Scheduling and Routing for Messages in Time-sensitive Networking17
MHDeep: Mental Health Disorder Detection System Based on Wearable Sensors and Artificial Neural Networks16
Edge-SLAM: Edge-Assisted Visual Simultaneous Localization and Mapping16
SNR: S queezing N umerical R ange Defuses Bit Error Vulnerability Surface in Deep Neural Networks16
ROBIN: A Robust Optical Binary Neural Network Accelerator16
SLAQA16
HMDS: A Makespan Minimizing DAG Scheduler for Heterogeneous Distributed Systems15
Predictive Monitoring with Logic-Calibrated Uncertainty for Cyber-Physical Systems15
Hardware Performance Counter-Based Fine-Grained Malware Detection15
Camaroptera: A Long-range Image Sensor with Local Inference for Remote Sensing Applications14
A Survey of Blockchain Data Management Systems14
Learning Nondeterministic Real-Time Automata14
Design Space Exploration for Ultra-Low-Energy and Secure IoT MCUs14
TAMA14
Improving Performance-Power-Programmability in Space Avionics with Edge Devices: VBN on Myriad2 SoC14
AppAxO : Designing App lication-specific A ppro x imate O 13
Improving Power of DSP and CNN Hardware Accelerators Using Approximate Floating-point Multipliers13
SAGE: A Split-Architecture Methodology for Efficient End-to-End Autonomous Vehicle Control13
CAN Bus Intrusion Detection Based on Auxiliary Classifier GAN and Out-of-distribution Detection13
EC-ECC: Accelerating Elliptic Curve Cryptography for Edge Computing on Embedded GPU TX212
Event-B Hybridation12
CICERO: A Domain-Specific Architecture for Efficient Regular Expression Matching11
Post-Quantum Signatures on RISC-V with Hardware Acceleration11
Real-time Attack-recovery for Cyber-physical Systems Using Linear-quadratic Regulator11
DFSynthesizer: Dataflow-based Synthesis of Spiking Neural Networks to Neuromorphic Hardware11
DEEPEYE11
An Interpretable Machine Learning Model Enhanced Integrated CPU-GPU DVFS Governor11
AHA: An Agile Approach to the Design of Coarse-Grained Reconfigurable Accelerators and Compilers11
Compositional Learning and Verification of Neural Network Controllers11
Improving Variational Autoencoder based Out-of-Distribution Detection for Embedded Real-time Applications11
FELIX: A Ferroelectric FET Based Low Power Mixed-Signal In-Memory Architecture for DNN Acceleration10
Dealing with Uncertainty in pWCET Estimations10
Horizontal Side-Channel Vulnerabilities of Post-Quantum Key Exchange and Encapsulation Protocols10
CEDR: A Compiler-integrated, Extensible DSSoC Runtime10
Learning to Train CNNs on Faulty ReRAM-based Manycore Accelerators9
Determinism9
RT-ZooKeeper: Taming the Recovery Latency of a Coordination Service9
A Composable Monitoring System for Heterogeneous Embedded Platforms9
DNN Is Not All You Need: Parallelizing Non-neural ML Algorithms on Ultra-low-power IoT Processors9
Towards an Integrated Vehicle Management System in DriveOS9
PhiNets: A Scalable Backbone for Low-power AI at the Edge9
Thermal-aware Adaptive Platform Management for Heterogeneous Embedded Systems9
DynO: Dynamic Onloading of Deep Neural Networks from Cloud to Device9
Golden Chip-Free Trojan Detection Leveraging Trojan Trigger’s Side-Channel Fingerprinting9
Demystifying Energy Consumption Dynamics in Transiently powered Computers9
Design Space Exploration for Secure IoT Devices and Cyber-Physical Systems9
Human Activity Recognition on Microcontrollers with Quantized and Adaptive Deep Neural Networks9
Two Birds With One Stone: Boosting Both Search and Write Performance for Tree Indices on Persistent Memory8
Synergistically Exploiting CNN Pruning and HLS Versioning for Adaptive Inference on Multi-FPGAs at the Edge8
Winograd Convolution for Deep Neural Networks: Efficient Point Selection8
Fast and Energy-Efficient State Checkpointing for Intermittent Computing8
Software-Managed Read and Write Wear-Leveling for Non-Volatile Main Memory8
Horizontal Auto-Scaling for Multi-Access Edge Computing Using Safe Reinforcement Learning8
Reducing Energy in GPGPUs through Approximate Trivial Bypassing8
Online Learning for Orchestration of Inference in Multi-user End-edge-cloud Networks8
MAGNETO8
Heterogeneity-aware Multicore Synchronization for Intermittent Systems8
Design-Technology Co-Optimization for NVM-Based Neuromorphic Processing Elements8
SEAMS8
FLASH: F ast Neura l A rchitecture S earch with H ardware8
An Energy-Efficient DRAM Cache Architecture for Mobile Platforms With PCM-Based Main Memory8
Virtualizing a Post-Moore’s Law Analog Mesh Processor: The Case of a Photonic PDE Accelerator7
Rtkaller: State-aware Task Generation for RTOS Fuzzing7
Side-channel and Fault-injection attacks over Lattice-based Post-quantum Schemes (Kyber, Dilithium): Survey and New Results7
MaxTracker: Continuously Tracking the Maximum Computation Progress for Energy Harvesting ReRAM-based CNN Accelerators7
Domain-specific Hybrid Mapping for Energy-efficient Baseband Processing in Wireless Networks7
MemFHE: End-to-end Computing with Fully Homomorphic Encryption in Memory7
LAMBDA7
SPECTRUM7
Block Walsh–Hadamard Transform-based Binary Layers in Deep Neural Networks7
Sense Your Power7
RiSA: A Reinforced Systolic Array for Depthwise Convolutions and Embedded Tensor Reshaping7
Temporal Robustness of Temporal Logic Specifications: Analysis and Control Design6
ETAP: Energy-aware Timing Analysis of Intermittent Programs6
Beyond Cache Attacks6
Tolerating Defects in Low-Power Neural Network Accelerators Via Retraining-Free Weight Approximation6
SG-Float: Achieving Memory Access and Computing Power Reduction Using Self-Gating Float in CNNs6
QUAREM: Maximising QoE Through Adaptive Resource Management in Mobile MPSoC Platforms6
A TCAM-based Caching Architecture Framework for Packet Classification6
A Distributed Real-time Scheduling System for Industrial Wireless Networks6
Improving the Performance of Hybrid Caches Using Partitioned Victim Caching6
EncoDeep6
Optimus: An Operator Fusion Framework for Deep Neural Networks6
DASS: Differentiable Architecture Search for Sparse Neural Networks6
Efficient Realization of Decision Trees for Real-Time Inference6
Crab-tree6
Energy-efficient Real-time Scheduling on Multicores6
Domain-Specific Architectures: Research Problems and Promising Approaches6
Trustworthy Autonomous System Development6
Test Generation for Hardware Trojan Detection Using Correlation Analysis and Genetic Algorithm6
HW-FlowQ: A Multi-Abstraction Level HW-CNN Co-design Quantization Methodology6
Generalized Weakly Hard Schedulability Analysis for Real-Time Periodic Tasks6
Chauffeur: Benchmark Suite for Design and End-to-End Analysis of Self-Driving Vehicles on Embedded Systems6
??????: Utilizing Hyperdimensional Computing for a More Robust and Efficient Machine Learning System6
Software Hint-Driven Data Management for Hybrid Memory in Mobile Systems6
AdaTest: Reinforcement Learning and Adaptive Sampling for On-chip Hardware Trojan Detection5
GMAI5
DSTL5
Probabilistic Estimation of Threat Intrusion in Embedded Systems for Runtime Detection5
DIAC5
LPWAN in the TV White Spaces5
Facilitating Human Activity Data Annotation via Context-Aware Change Detection on Smartwatches5
Synaptic Activity and Hardware Footprint of Spiking Neural Networks in Digital Neuromorphic Systems5
Approximate Cache in GPGPUs5
Optimization of Signal Processing Applications Using Parameterized Error Models for Approximate Adders5
Reliability Assessment and Safety Arguments for Machine Learning Components in System Assurance5
Cache Interference-aware Task Partitioning for Non-preemptive Real-time Multi-core Systems5
Adaptive Computation Reuse for Energy-Efficient Training of Deep Neural Networks5
Quantized Sparse Training: A Unified Trainable Framework for Joint Pruning and Quantization in DNNs5
A Configurable CRYSTALS-Kyber Hardware Implementation with Side-Channel Protection5
More Is Less: Model Augmentation for Intermittent Deep Inference5
Adaptive Task Allocation and Scheduling on NoC-based Multicore Platforms with Multitasking Processors5
Hardware Acceleration for Embedded Keyword Spotting: Tutorial and Survey5
UBAR5
Accelerating Attention Mechanism on FPGAs based on Efficient Reconfigurable Systolic Array5
Skills Gaps in the Industry5
Minimizing Stack Memory for Partitioned Mixed-criticality Scheduling on Multiprocessor Platforms5
Hardware Trojan Detection Using Machine Learning: A Tutorial5
Comparative Analysis and Enhancement of CFG-based Hardware-Assisted CFI Schemes5
Application-centric Network Management - Addressing Safety and Real-time in V2X Applications5
Energy-efficient and Reliable Inference in Nonvolatile Memory under Extreme Operating Conditions5
Toward Adversary-aware Non-iterative Model Pruning through D ynamic N etwork R ewiring of DNNs5
Contention Grading and Adaptive Model Selection for Machine Vision in Embedded Systems5
0.027227878570557