Default Cover Image

2021 24th Euromicro Conference on Digital System Design (DSD)

Sept. 1 2021 to Sept. 3 2021

Palermo, Spain

ISBN: 978-1-6654-2703-6

Table of Contents

[Title page i]Freely available from IEEE.pp. 1-1
[Title page iii]Freely available from IEEE.pp. 3-3
[Copyright notice]Freely available from IEEE.pp. 4-4
Table of ContentsFreely available from IEEE.pp. 5-16
Message from the General ChairFreely available from IEEE.pp. 17-17
Message from the DSD Program ChairsFreely available from IEEE.pp. 18-19
DSD Main Track Program CommitteeFreely available from IEEE.pp. 20-24
SubreviewersFreely available from IEEE.pp. 25-25
DSD 2021 KeynotesFull-text access may be available. Sign in or learn about subscription options.pp. 26-28
A RISC-V-based FPGA Overlay to Simplify Embedded Accelerator DeploymentFull-text access may be available. Sign in or learn about subscription options.pp. 9-17
A Power-Efficient Parameter Quantization Technique for CNN AcceleratorsFull-text access may be available. Sign in or learn about subscription options.pp. 18-23
An efficient FPGA-based co-processor for feature point detection and trackingFull-text access may be available. Sign in or learn about subscription options.pp. 24-29
Vector Processing Unit: A RISC-V based SIMD Co-processor for Embedded ProcessingFull-text access may be available. Sign in or learn about subscription options.pp. 30-34
An Open-Source Framework for the Generation of RISC-V Processor + CGRA Accelerator SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 35-42
A Connected Component Labelling algorithm for a multi-pixel per clock cycle video streamFull-text access may be available. Sign in or learn about subscription options.pp. 43-50
An adaptive pixel accumulation algorithm for a 1D micro-scanning LiDARFull-text access may be available. Sign in or learn about subscription options.pp. 51-57
Managing the Resource Continuum in a Real Video Surveillance ScenarioFull-text access may be available. Sign in or learn about subscription options.pp. 58-61
A Boolean Heuristic for Disjoint SOP SynthesisFull-text access may be available. Sign in or learn about subscription options.pp. 62-68
Resynthesis of logic circuits using machine learning and reconvergent pathsFull-text access may be available. Sign in or learn about subscription options.pp. 69-76
Decomposition of transition systems into sets of synchronizing state machinesFull-text access may be available. Sign in or learn about subscription options.pp. 77-81
Efficient Implementation of Heterogeneous Dataflow Models using Synchronous IO PatternsFull-text access may be available. Sign in or learn about subscription options.pp. 82-89
Massively parallel binary neural network inference for detecting ships in FPGA systems on the edgeFull-text access may be available. Sign in or learn about subscription options.pp. 90-96
FPGA-based real-time monitoring support for CAN applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 101-106
Architectural Implementation of a Reconfigurable NoC Design for Multi-ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 139-142
Network-on-ReRAM for Scalable Processing-in-Memory Architecture DesignFull-text access may be available. Sign in or learn about subscription options.pp. 143-149
Towards Machine Learning Support for Embedded System TestsFull-text access may be available. Sign in or learn about subscription options.pp. 166-173
Highly Parallel Sample Rate Converter for Space Telemetry TransmittersFull-text access may be available. Sign in or learn about subscription options.pp. 178-181
Evaluation of Time Series Clustering on Embedded Sensor PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 187-191
A Hardware/Software Concept for Partial Logic Updates of Embedded Soft Processors at RuntimeFull-text access may be available. Sign in or learn about subscription options.pp. 199-207
Metrics for the Evaluation of Approximate Sequential Streaming CircuitsFull-text access may be available. Sign in or learn about subscription options.pp. 208-211
ParalOS: A Scheduling & Memory Management Framework for Heterogeneous VPUsFull-text access may be available. Sign in or learn about subscription options.pp. 221-228
Scheduling Persistent and Fully Cooperative InstructionsFull-text access may be available. Sign in or learn about subscription options.pp. 229-237
To Pin or Not to Pin: Asserting the Scalability of QEMU Parallel ImplementationFull-text access may be available. Sign in or learn about subscription options.pp. 238-245
Gain and Pain of a Reliable Delay ModelFull-text access may be available. Sign in or learn about subscription options.pp. 246-250
NMPO: Near-Memory Computing Profiling and OffloadingFull-text access may be available. Sign in or learn about subscription options.pp. 259-267
Building Blocks and Interaction Patterns of Unmanned Aerial SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 278-285
Pre-Integrated Architectures for sustainable complex Cyber-Physical SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 319-324
RSM Protection of the PRESENT Lightweight Cipher as a RISC-V ExtensionFull-text access may be available. Sign in or learn about subscription options.pp. 325-332
Secure and dependable: Area-efficient masked and fault-tolerant architecturesFull-text access may be available. Sign in or learn about subscription options.pp. 333-338
Novel Non-cryptographic Hash Functions for Networking and Security Applications on FPGAFull-text access may be available. Sign in or learn about subscription options.pp. 347-354
MaDMAN: Detection of Software Attacks Targeting Hardware VulnerabilitiesFull-text access may be available. Sign in or learn about subscription options.pp. 355-362
Analysis of a Laser-induced Instructions Replay Fault Model in a 32-bit MicrocontrollerFull-text access may be available. Sign in or learn about subscription options.pp. 363-370
Optical Fault Injection Attacks against Radiation-Hard Shift RegistersFull-text access may be available. Sign in or learn about subscription options.pp. 371-375
Towards a More Flexible IoT SAFE ImplementationFull-text access may be available. Sign in or learn about subscription options.pp. 376-380
5G Security: FPGA Implementation of SNOW-V Stream CipherFull-text access may be available. Sign in or learn about subscription options.pp. 381-384
Extending Circuit Design Flow for Early Assessment of Fault Attack VulnerabilitiesFull-text access may be available. Sign in or learn about subscription options.pp. 385-388
MPC-Based Speed Tracking for Automated Urban Buses Performing V2I Communications with Traffic LightsFull-text access may be available. Sign in or learn about subscription options.pp. 396-401
Controlled Intra-Platoon Collisions for Emergency Braking in Close-Distance Driving ArrangementsFull-text access may be available. Sign in or learn about subscription options.pp. 402-409
Runnable Configuration in Mixed Classic/Adaptive AUTOSAR Systems by Leveraging NondeterminismFull-text access may be available. Sign in or learn about subscription options.pp. 418-425
Improving the Efficiency of Transformers for Resource-Constrained DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 449-456
Co-designing Intelligent Control of Building HVACs and MicrogridsFull-text access may be available. Sign in or learn about subscription options.pp. 457-464
Model-based System Architecture for Event-triggered Wireless Control of Bio-analytical DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 465-471
Modeling Battery SoC Predictions for Smart Connected Glasses SimulationsFull-text access may be available. Sign in or learn about subscription options.pp. 472-479
Combining SWAPs and Remote CNOT Gates for Quantum Circuit TransformationFull-text access may be available. Sign in or learn about subscription options.pp. 495-501
Towards Post-Quantum Enhanced Identity-Based EncryptionFull-text access may be available. Sign in or learn about subscription options.pp. 502-509
Digital Forensics, Video Forgery Recognition, for Cybersecurity SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 510-513
Automated Debugging-Aware Visualization Technique for SystemC HLS DesignsFull-text access may be available. Sign in or learn about subscription options.pp. 519-526
Search Strategy of Large Nonlinear Block CodesFull-text access may be available. Sign in or learn about subscription options.pp. 527-534
Automatic Design of Fault-Tolerant Systems for VHDL and SRAM-based FPGAsFull-text access may be available. Sign in or learn about subscription options.pp. 549-552
Reliability Analysis of the FPGA Control System with Reconfiguration HardeningFull-text access may be available. Sign in or learn about subscription options.pp. 553-556
Author IndexFreely available from IEEE.pp. 563-567
Showing 91 out of 91