ACM Transactions on Embedded Computing Systems

Papers
(The TQCC of ACM Transactions on Embedded Computing Systems is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Toward a Lingua Franca for Deterministic Concurrent Systems36
Edge-AI-Driven Framework with Efficient Mobile Network Design for Facial Expression Recognition29
MARS: mmWave-based Assistive Rehabilitation System for Smart Healthcare28
Heuristic Computation Offloading Algorithms for Mobile Users in Fog Computing26
Game-Based Task Offloading of Multiple Mobile Devices with QoS in Mobile Edge Computing Systems of Limited Computation Capacity26
TensorRT-Based Framework and Optimization Methodology for Deep Learning Inference on Jetson Boards26
SIAM: Chiplet-based Scalable In-Memory Acceleration with Mesh for Deep Neural Networks24
Verifying the Safety of Autonomous Systems with Neural Network Controllers23
Side-channel Analysis of Lattice-based Post-quantum Cryptography: Exploiting Polynomial Multiplication22
Deep Ensemble Learning for Human Activity Recognition Using Wearable Sensors via Filter Activation22
Intermittent-Aware Neural Architecture Search19
LATTE: L STM Self- Att ention based Anomaly Detection in E mbedded Automotive Platforms18
Distributed Task Offloading and Resource Purchasing in NOMA-Enabled Mobile Edge Computing: Hierarchical Game Theoretical Approaches18
Edge Intelligence: Concepts, Architectures, Applications, and Future Directions17
Reliability-aware Scheduling and Routing for Messages in Time-sensitive Networking16
Algorithm-hardware Co-design of Attention Mechanism on FPGA Devices16
Edge-SLAM: Edge-Assisted Visual Simultaneous Localization and Mapping16
ROBIN: A Robust Optical Binary Neural Network Accelerator16
SNR: S queezing N umerical R ange Defuses Bit Error Vulnerability Surface in Deep Neural Networks15
Predictive Monitoring with Logic-Calibrated Uncertainty for Cyber-Physical Systems15
HMDS: A Makespan Minimizing DAG Scheduler for Heterogeneous Distributed Systems15
MHDeep: Mental Health Disorder Detection System Based on Wearable Sensors and Artificial Neural Networks15
SLAQA15
TAMA14
A Survey of Blockchain Data Management Systems14
Camaroptera: A Long-range Image Sensor with Local Inference for Remote Sensing Applications14
Design Space Exploration for Ultra-Low-Energy and Secure IoT MCUs14
Improving Performance-Power-Programmability in Space Avionics with Edge Devices: VBN on Myriad2 SoC14
CAN Bus Intrusion Detection Based on Auxiliary Classifier GAN and Out-of-distribution Detection13
Improving Power of DSP and CNN Hardware Accelerators Using Approximate Floating-point Multipliers13
SAGE: A Split-Architecture Methodology for Efficient End-to-End Autonomous Vehicle Control13
Hardware Performance Counter-Based Fine-Grained Malware Detection13
AppAxO : Designing App lication-specific A ppro x imate O 13
Event-B Hybridation12
Compositional Learning and Verification of Neural Network Controllers11
Improving Variational Autoencoder based Out-of-Distribution Detection for Embedded Real-time Applications11
CICERO: A Domain-Specific Architecture for Efficient Regular Expression Matching11
Learning Nondeterministic Real-Time Automata11
EC-ECC: Accelerating Elliptic Curve Cryptography for Edge Computing on Embedded GPU TX211
DEEPEYE11
An Interpretable Machine Learning Model Enhanced Integrated CPU-GPU DVFS Governor11
DFSynthesizer: Dataflow-based Synthesis of Spiking Neural Networks to Neuromorphic Hardware10
Horizontal Side-Channel Vulnerabilities of Post-Quantum Key Exchange and Encapsulation Protocols10
Real-time Attack-recovery for Cyber-physical Systems Using Linear-quadratic Regulator10
FELIX: A Ferroelectric FET Based Low Power Mixed-Signal In-Memory Architecture for DNN Acceleration10
CEDR: A Compiler-integrated, Extensible DSSoC Runtime10
Post-Quantum Signatures on RISC-V with Hardware Acceleration10
Dealing with Uncertainty in pWCET Estimations10
Learning to Train CNNs on Faulty ReRAM-based Manycore Accelerators9
Golden Chip-Free Trojan Detection Leveraging Trojan Trigger’s Side-Channel Fingerprinting9
A Composable Monitoring System for Heterogeneous Embedded Platforms9
DynO: Dynamic Onloading of Deep Neural Networks from Cloud to Device9
Demystifying Energy Consumption Dynamics in Transiently powered Computers9
Design Space Exploration for Secure IoT Devices and Cyber-Physical Systems9
AHA: An Agile Approach to the Design of Coarse-Grained Reconfigurable Accelerators and Compilers9
Towards an Integrated Vehicle Management System in DriveOS9
Thermal-aware Adaptive Platform Management for Heterogeneous Embedded Systems9
Two Birds With One Stone: Boosting Both Search and Write Performance for Tree Indices on Persistent Memory8
RT-ZooKeeper: Taming the Recovery Latency of a Coordination Service8
An Energy-Efficient DRAM Cache Architecture for Mobile Platforms With PCM-Based Main Memory8
DNN Is Not All You Need: Parallelizing Non-neural ML Algorithms on Ultra-low-power IoT Processors8
Heterogeneity-aware Multicore Synchronization for Intermittent Systems8
Horizontal Auto-Scaling for Multi-Access Edge Computing Using Safe Reinforcement Learning8
Design-Technology Co-Optimization for NVM-Based Neuromorphic Processing Elements8
SEAMS8
FLASH: F ast Neura l A rchitecture S earch with H ardware8
Online Learning for Orchestration of Inference in Multi-user End-edge-cloud Networks8
Determinism8
Synergistically Exploiting CNN Pruning and HLS Versioning for Adaptive Inference on Multi-FPGAs at the Edge8
Reducing Energy in GPGPUs through Approximate Trivial Bypassing8
MAGNETO8
Fast and Energy-Efficient State Checkpointing for Intermittent Computing8
Software-Managed Read and Write Wear-Leveling for Non-Volatile Main Memory8
Virtualizing a Post-Moore’s Law Analog Mesh Processor: The Case of a Photonic PDE Accelerator7
Rtkaller: State-aware Task Generation for RTOS Fuzzing7
Side-channel and Fault-injection attacks over Lattice-based Post-quantum Schemes (Kyber, Dilithium): Survey and New Results7
SPECTRUM7
Winograd Convolution for Deep Neural Networks: Efficient Point Selection7
MemFHE: End-to-end Computing with Fully Homomorphic Encryption in Memory7
LAMBDA7
Domain-specific Hybrid Mapping for Energy-efficient Baseband Processing in Wireless Networks7
Block Walsh–Hadamard Transform-based Binary Layers in Deep Neural Networks7
MaxTracker: Continuously Tracking the Maximum Computation Progress for Energy Harvesting ReRAM-based CNN Accelerators7
Domain-Specific Architectures: Research Problems and Promising Approaches6
Energy-efficient Real-time Scheduling on Multicores6
EncoDeep6
Human Activity Recognition on Microcontrollers with Quantized and Adaptive Deep Neural Networks6
Tolerating Defects in Low-Power Neural Network Accelerators Via Retraining-Free Weight Approximation6
Efficient Realization of Decision Trees for Real-Time Inference6
A Distributed Real-time Scheduling System for Industrial Wireless Networks6
Improving the Performance of Hybrid Caches Using Partitioned Victim Caching6
QUAREM: Maximising QoE Through Adaptive Resource Management in Mobile MPSoC Platforms6
Trustworthy Autonomous System Development6
A TCAM-based Caching Architecture Framework for Packet Classification6
Generalized Weakly Hard Schedulability Analysis for Real-Time Periodic Tasks6
Chauffeur: Benchmark Suite for Design and End-to-End Analysis of Self-Driving Vehicles on Embedded Systems6
Temporal Robustness of Temporal Logic Specifications: Analysis and Control Design6
Software Hint-Driven Data Management for Hybrid Memory in Mobile Systems6
Crab-tree6
Sense Your Power6
RiSA: A Reinforced Systolic Array for Depthwise Convolutions and Embedded Tensor Reshaping6
PhiNets: A Scalable Backbone for Low-power AI at the Edge6
Contention Grading and Adaptive Model Selection for Machine Vision in Embedded Systems5
Reliability Assessment and Safety Arguments for Machine Learning Components in System Assurance5
Probabilistic Estimation of Threat Intrusion in Embedded Systems for Runtime Detection5
DSTL5
Quantized Sparse Training: A Unified Trainable Framework for Joint Pruning and Quantization in DNNs5
A Configurable CRYSTALS-Kyber Hardware Implementation with Side-Channel Protection5
Facilitating Human Activity Data Annotation via Context-Aware Change Detection on Smartwatches5
??????: Utilizing Hyperdimensional Computing for a More Robust and Efficient Machine Learning System5
Synaptic Activity and Hardware Footprint of Spiking Neural Networks in Digital Neuromorphic Systems5
Approximate Cache in GPGPUs5
Accelerating Attention Mechanism on FPGAs based on Efficient Reconfigurable Systolic Array5
GMAI5
Hardware Trojan Detection Using Machine Learning: A Tutorial5
Optimus: An Operator Fusion Framework for Deep Neural Networks5
DIAC5
Application-centric Network Management - Addressing Safety and Real-time in V2X Applications5
Energy-efficient and Reliable Inference in Nonvolatile Memory under Extreme Operating Conditions5
Toward Adversary-aware Non-iterative Model Pruning through D ynamic N etwork R ewiring of DNNs5
Hardware Acceleration for Embedded Keyword Spotting: Tutorial and Survey5
UBAR5
Optimization of Signal Processing Applications Using Parameterized Error Models for Approximate Adders5
Skills Gaps in the Industry5
Beyond Cache Attacks5
Adaptive Computation Reuse for Energy-Efficient Training of Deep Neural Networks5
Test Generation for Hardware Trojan Detection Using Correlation Analysis and Genetic Algorithm5
More Is Less: Model Augmentation for Intermittent Deep Inference5
Adaptive Task Allocation and Scheduling on NoC-based Multicore Platforms with Multitasking Processors5
HW-FlowQ: A Multi-Abstraction Level HW-CNN Co-design Quantization Methodology5
0.050741910934448