Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,632,198 papers from all fields of science
Search
Sign In
Create Free Account
computer system hardware
Known as:
Computer Hardware
, Hardware, Computer
National Institutes of Health
Create Alert
Alert
Related topics
Related topics
12 relations
Computer Hardware Device Component
Broader (2)
Computers
computer technology
Narrower (9)
Computers, Mainframe
Microcomputers
Minicomputers
Online Systems
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Adversarial Evasion-Resilient Hardware Malware Detectors
Khaled N. Khasawneh
,
N. Abu-Ghazaleh
,
D. Ponomarev
,
Lei Yu
IEEE/ACM International Conference on Computer…
2018
Corpus ID: 53062033
Machine learning offers tantalizing possibilities in computing and autonomous systems: data driven components and systems are…
Expand
2018
2018
On the Effect of Aging in Detecting Hardware Trojan Horses with Template Analysis
Naghmeh Karimi
,
J. Danger
,
S. Guilley
IEEE International Symposium on On-Line Testing…
2018
Corpus ID: 52915600
With the outsourcing of design flow, ensuring the security and trustworthiness of integrated circuits has become more challenging…
Expand
2015
2015
Turbocharging Quantum Tomography
R. Blume-Kohout
,
J. Gamble
,
E. Nielsen
,
P. Maunz
,
Travis L. Scholten
,
K. Rudinger
2015
Corpus ID: 9172050
Quantum tomography is used to characterize quantum operations implemented in quantum information processing (QIP) hardware…
Expand
2015
2015
Towards e‐parasitology: making use of virtual microscopy
Rashad Abdul‑Ghani
Tropical medicine & international health
2015
Corpus ID: 206325362
Reference EPFL-CONF-214216View record in Web of Science Record created on 2015-12-02, modified on 2016-08-09
2015
2015
HaTCh : A Formal Framework of Hardware Trojan Design and Detection
Syed Kamran Haider
,
Chenglu Jin
,
Masab Ahmad
,
D. Shila
,
O. Khan
,
Marten van Dijk
2015
Corpus ID: 8038642
Use of third party ‘closed source’ IP cores has become a common practice in Electronic Design Automation (EDA) industry. However…
Expand
2014
2014
Reduced Hardware Lock Elision
Y. Afek
2014
Corpus ID: 17219224
Hardware lock elision (HLE) concurrently executes lock critical sections as hardware transactions, but fallbacks to the original…
Expand
2013
2013
Toward Photorealism in Endoscopic Sinus Surgery Simulation
G. Ruthenbeck
,
J. Hobson
,
Andrew Carney
,
Stephen Sloan
,
R. Sacks
,
K. Reynolds
American Journal of Rhinology & Allergy
2013
Corpus ID: 45024435
Background Endoscopic sinus surgery (ESS) is the surgical standard treatment for chronic rhinitis/rhinosinusitis and nasal…
Expand
2011
2011
Backend for virtual platforms with hardware scheduler in the MAPS framework
J. Castrillón
,
A. Shah
,
L. Murillo
,
R. Leupers
,
G. Ascheid
Latin American Symposium on Circuits and Systems
2011
Corpus ID: 41297794
Advances in process integration, the power wall and end-user application demands have made Multi-Processor Systems on Chip…
Expand
Highly Cited
2006
Highly Cited
2006
Circadian variations of stellate ganglion nerve activity in ambulatory dogs.
B. Jung
,
Amish S. Dave
,
+9 authors
Peng-Sheng Chen
Heart Rhythm
2006
Corpus ID: 22915911
1993
1993
The automatic generation of instruction-level error manifestations of hardware faults: a new fault-injection model
Charles R. Yount
1993
Corpus ID: 113829087
A new fault model for processors based on a register-transfer-level (RTL) description is presented. This model addresses time…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE