In recent times, the research works relating to smart traffic infrastruc...
With rapid advancements in electronic gadgets, the security and privacy
...
This paper proposes a 3-input arbiter-based novel physically unclonable
...
Nowadays, data-intensive applications are gaining popularity and, togeth...
Adversarial attacks have proved to be the major impediment in the progre...
Modern client processors typically use one of three commonly-used power
...
Data-intensive applications are poised to benefit directly from
processi...
Modern electronic systems become evermore complex, yet remain modular, w...
This paper describes an analytical modeling tool called Bitlet that can ...
Efficient low complexity error correcting code(ECC) is considered as an
...
Security of (semi)-autonomous vehicles is a growing concern, first, due ...
Deep learning has emerged as a strong and efficient framework that can b...
We present efficient realization of Generalized Givens Rotation (GGR) ba...
Ransomware can produce direct and controllable economic loss, which make...
In this paper, we present efficient realization of Kalman Filter (KF) th...
We present efficient realization of Householder Transform (HT) based QR
...
Basic Linear Algebra Subprograms (BLAS) and Linear Algebra Package (LAPA...
Basic Linear Algebra Subprograms (BLAS) play key role in high performanc...