Skip to Main content Skip to Navigation



 ADAptive Computing

Consult your copyright

Number of Files


Nomber of Notices


Collaborations’ map


Rowhammer Architecture Magnetic RAM RSA Non volatile memory Blockchain Microarchitecture Modeling Mitigation Energy Monitoring M2M Deep learning Memory hierarchy Security SoC Power Monitoring Error analysis Generative Adversarial Network Processor scheduling Resistive RAM Cryptography Gem5 simulator Gem5 BigLITTLE Education Multicore systems Edge computing Spintronic memory and logic Simulation MRAM Machine Learning Side-channel attacks SCAs OpenMP Silent stores Scalability exploration Deep Neural Networks Resource allocation Physically unclonable function Adaptive systems Embedded System Machine learning Parameter exploration Design Space Exploration Lightweight cryptography Data Distribution Service Deep Learning Parallel programming languages Reliability Energy efficiency Hardware Accelerator Caches STT-MRAM Distributed systems Through-silicon vias Approximate Computing Multicore processing Hardware Scheduling IoT Hardware security FPGA security Model Compression Sécurité Decentralized network Delays Neural networks Multi-threaded programs Performance Adaptation Privacy Detection DRAM Energy-efficiency Power RO frequency Design space exploration Embedded systems Memory device Fog computing Memory architecture Power demand IP Protection Transistors Network-on-Chip System reliability Performance evaluation Three-dimensional displays Multiprocessing systems Efficacité énergétique Side-channel attacks FPGA Internet of Things Computer architecture Software-Defined Power Domains Ring oscillator Gateway Quantization Internet des Objets Approximate computing