Skip to Main content Skip to Navigation



 ADAptive Computing

Consult your copyright

Number of Files


Nomber of Notices


Collaborations’ map


Hardware RO frequency Embedded systems Scalability exploration Simulation Network-on-Chip DRAM OpenMP Deep Neural Networks Blockchain Architecture Neural networks Spintronic memory and logic Modeling Lightweight cryptography STT-MRAM Security Silent stores Energy-efficiency Cryptography Memory hierarchy Multicore systems Power Monitoring Monitoring Multi-threaded programs Scheduling Through-silicon vias Design space exploration Gem5 simulator Magnetic RAM Efficacité énergétique IoT Sécurité Adaptation MRAM Hardware security Internet des Objets Resistive RAM Deep learning Internet of Things BigLITTLE Rowhammer Memory device SoC Computer architecture Power IP Protection Parallel programming languages Energy efficiency Approximate computing Side-channel attacks Ring oscillator Generative Adversarial Network M2M Detection Gem5 Software-Defined Power Domains Adaptive systems Side-channel attacks SCAs FPGA Quantization Embedded System Approximate Computing Performance evaluation Fog computing Hardware Accelerator Design Space Exploration Power demand Multicore processing Machine learning Multiprocessing systems Physically unclonable function Edge computing Caches Reliability Gateway Data Distribution Service RSA FPGA security Energy Deep Learning Non volatile memory Microarchitecture Three-dimensional displays Parameter exploration Decentralized network Processor scheduling Distributed systems Mitigation Transistors System reliability Resource allocation Error analysis Machine Learning Performance Delays Memory architecture Model Compression Privacy Education