Skip to Main content Skip to Navigation



 ADAptive Computing

Consult your copyright

Number of Files


Nomber of Notices


Collaborations’ map


Multi-threaded programs Design Space Exploration Error analysis Scalability exploration Side-channel attacks SCAs Spintronic memory and logic Energy-efficiency Parallel programming languages Hardware Multicore processing Magnetic RAM Internet of Things Cryptography M2M Lightweight cryptography RO frequency Microarchitecture Internet des Objets Blockchain Approximate Computing Physically unclonable function Quantization Fog computing System reliability Power demand Resistive RAM Gem5 Security Privacy Adaptive systems Memory hierarchy Side-channel attacks Gateway Design space exploration Processor scheduling Performance Decentralized network Resource allocation Three-dimensional displays Gem5 simulator Rowhammer Network-on-Chip Model Compression Power STT-MRAM Memory device Memory architecture Education Ring oscillator Detection Edge computing Modeling Data Distribution Service OpenMP Multiprocessing systems RSA Energy efficiency DRAM Distributed systems MRAM Simulation Energy Generative Adversarial Network Computer architecture Software-Defined Power Domains BigLITTLE Mitigation Neural networks Transistors Silent stores Monitoring Approximate computing Through-silicon vias Deep Neural Networks Machine Learning Reliability Deep Learning Architecture Power Monitoring Scheduling Machine learning Embedded System Sécurité Delays IP Protection FPGA Deep learning Parameter exploration Efficacité énergétique FPGA security Hardware Accelerator Performance evaluation Embedded systems Adaptation SoC IoT Hardware security Multicore systems Caches Non volatile memory