Default Cover Image

2024 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)

July 1 2024 to July 3 2024

Knoxville, TN, USA

ISBN: 979-8-3503-5411-9

Table of Contents

Title Page IFreely available from IEEE.pp. 1-1
CoverFreely available from IEEE.pp. 1-1
Copyright PageFreely available from IEEE.pp. 1-1
Table of ContentsFreely available from IEEE.pp. vi-xxv
Steering Committee; ISVLSI 2024Freely available from IEEE.pp. xxxi-xxxi
Organizing Committee; ISVLSI 2024Freely available from IEEE.pp. xxxii-xxxii
Program Committee; ISVLSI 2024Freely available from IEEE.pp. xxxiii-xxxviii
KeynotesFreely available from IEEE.pp. xxxix-xliv
Secure Energy-Efficient Implementation of CNN on FPGAs for Accuracy Dependent Real Time Task ProcessingFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
STCO: Driving the More than Moore EraFull-text access may be available. Sign in or learn about subscription options.pp. 7-8
An 8-bit 1 MS/s Low-Power SAR ADC with an Enhanced EPC for Implantable Medical DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 9-14
Energy-aware Incremental OTA Update for Flash-based Batteryless IoT DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 51-56
Design of Multiplier Circuit Based on Signed-Digit Hybrid Stochastic ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 57-62
Energy-Efficient Design of Approximate VVC Interpolation Filters UnitsFull-text access may be available. Sign in or learn about subscription options.pp. 63-68
Adaptive and Offloaded CNNs for IoT-Edge FPGAsFull-text access may be available. Sign in or learn about subscription options.pp. 69-74
HIERA: High-Quality and High-Throughput Dehazing Hardware Accelerator with Reconfigurable Computing UnitFull-text access may be available. Sign in or learn about subscription options.pp. 75-80
A High-accuracy Time-efficient Error Metric Model for Approximate Computing CircuitsFull-text access may be available. Sign in or learn about subscription options.pp. 94-99
Random Microfluidic Chip Design with Diagonal Channels Using K-Means Clustering for Fluid DilutionsFull-text access may be available. Sign in or learn about subscription options.pp. 100-105
Most Significant Digit First Multiply-and-Accumulate Unit for Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 106-111
Exploring a Hybrid SRAM-RRAM Computing-In-Memory Architecture for DNNs Model InferenceFull-text access may be available. Sign in or learn about subscription options.pp. 112-117
RFET-Based Dynamic Differential Logic Cells Against Power Side-Channel AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 136-142
Towards Quantum-Resistant Security: Pre-Silicon Power Side-Channel Leakage Analysis of CRYSTALS-KyberFull-text access may be available. Sign in or learn about subscription options.pp. 149-154
Efficient Federated Learning Through Distributed Model PruningFull-text access may be available. Sign in or learn about subscription options.pp. 155-160
DAW-DMR: Divergence-Aware Warped DMR with Full Error Detection for GPGPU sFull-text access may be available. Sign in or learn about subscription options.pp. 161-166
Embedding Power Signature Generation into Low Dropout Voltage Regulators for Enhancing IoT SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 167-172
A Fine-Grained Dynamic Partitioning Against Cache-Based Timing Attacks via Cache LockingFull-text access may be available. Sign in or learn about subscription options.pp. 173-179
Optimizing LU Decomposition with RISC-V Based Hardware AccelerationFull-text access may be available. Sign in or learn about subscription options.pp. 210-215
Unfolded SiBM BCH Decoders for High- Throughput Low-Latency ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 216-221
High Energy Efficiency Radix-4 Booth Multiplier with Zero Encoding Skipping MechanismFull-text access may be available. Sign in or learn about subscription options.pp. 228-233
Machine Learning based Decoding of Heavy Hexagonal QECC for Asymmetric Quantum NoiseFull-text access may be available. Sign in or learn about subscription options.pp. 246-251
Towards Thermally Reliable Photonic Links for Multicore ProcessorsFull-text access may be available. Sign in or learn about subscription options.pp. 260-265
Automatic Validation and Design of Microfluidic Devices Following the ISO 22916 StandardFull-text access may be available. Sign in or learn about subscription options.pp. 278-283
Embracing Privacy, Robustness, and Efficiency with Trustworthy Federated Learning on Edge DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 284-289
Approximate Ternary Matrix Multiplication for Image Processing and Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 290-295
An Intelligent Memory Framework for Resource Constrained IoT SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 296-299
Predicting Stress in Older Adults with RNN and LSTM from Time Series Sensor Data and CortisolFull-text access may be available. Sign in or learn about subscription options.pp. 300-306
Adversarial Attack Resilient ML-Assisted Hardware Trojan Detection Technique*Full-text access may be available. Sign in or learn about subscription options.pp. 313-318
1-D Robust Chaotic Maps Through Systematic Shifting and Halfway Shifted ProductFull-text access may be available. Sign in or learn about subscription options.pp. 319-324
Multi-Objective Neural Architecture Search for In-Memory ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 343-348
HELP: Highly Efficient and Low-Latency Hardware Accelerator for Integer Polynomial MultiplicationFull-text access may be available. Sign in or learn about subscription options.pp. 355-360
Exploring Security Solutions and Vulnerabilities for Embedded Non-Volatile MemoriesFull-text access may be available. Sign in or learn about subscription options.pp. 361-366
Attacking Multi-Tenant FPGAs Without Manual Placement and RoutingFull-text access may be available. Sign in or learn about subscription options.pp. 367-372
A Survey of Side-Channel Attacks in Superconducting Quantum ComputersFull-text access may be available. Sign in or learn about subscription options.pp. 373-378
LLMs and the Future of Chip Design: Unveiling Security Risks and Building TrustFull-text access may be available. Sign in or learn about subscription options.pp. 385-390
Self-HWDebug: Automation of LLM Self-Instructing for Hardware Security VerificationFull-text access may be available. Sign in or learn about subscription options.pp. 391-396
IP Security in Structured ASIC: Challenges and ProspectsFull-text access may be available. Sign in or learn about subscription options.pp. 397-402
SegmentAI: A Neural Net Framework for Optimized Multiclass Image Segmentation via FPGAFull-text access may be available. Sign in or learn about subscription options.pp. 421-426
ConFUSE: Confusion-based Federated Unlearning with Salience ExplorationFull-text access may be available. Sign in or learn about subscription options.pp. 427-432
DT-IoMT: A Digital Twin Reference Model for Secure Internet of Medical ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 433-438
Low-power and Computing-free Privacy Design for IoT SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 439-444
Exploring the Correlation Between DRAM Latencies and Rowhammer AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 445-450
Machine Learning Intervened RIS-Based RF Interference Management for IoTFull-text access may be available. Sign in or learn about subscription options.pp. 457-462
A Low-Cost Minimally-Processed Inkjet-Printed Nonlinear Element for Reservoir ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 463-468
Energy-Efficient Power Analysis Attack Resilient Adiabatic MTJ-Based Nonvolatile CLBFull-text access may be available. Sign in or learn about subscription options.pp. 469-474
Optimal Application Allocation and Wireless User Association for Robust Edge ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 481-483
A Survey of Edge Computing Privacy and Security Threats and Their CountermeasuresFull-text access may be available. Sign in or learn about subscription options.pp. 484-489
System Support for Environmentally Sustainable Computing in Data CentersFull-text access may be available. Sign in or learn about subscription options.pp. 490-495
SCARIF: Towards Carbon Modeling of Cloud Servers with AcceleratorsFull-text access may be available. Sign in or learn about subscription options.pp. 496-501
Improving the Sustainability of Solid-State Drives by Prolonging LifetimeFull-text access may be available. Sign in or learn about subscription options.pp. 502-507
Resource-Efficient Adaptive-Network Inference Framework with Knowledge Distillation-Based Unified LearningFull-text access may be available. Sign in or learn about subscription options.pp. 508-513
Water-Wise Computing: Addressing Data Center Water Consumption for a Sustainable FutureFull-text access may be available. Sign in or learn about subscription options.pp. 514-514
Carbon-Aware Design of DNN Accelerators: Bridging Performance and SustainabilityFull-text access may be available. Sign in or learn about subscription options.pp. 515-520
TinyML for ECG Biometrics on Resource Constrained DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 521-526
Showing 100 out of 165