ACM Journal on Emerging Technologies in Computing Systems

短名J. Emerg. Technol. Comput. Syst.
Journal Impact1.90
国际分区NANOSCIENCE & NANOTECHNOLOGY(Q3)
期刊索引SCI Q3中科院 4 区
ISSN1550-4832, 1550-4840
h-index47
国内分区计算机科学(4区)计算机科学计算机硬件(4区)计算机科学工程电子与电气(4区)计算机科学纳米科技(4区)

JOURNAL OF EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS 邀请提交描述计算系统新兴技术研究和开发的原始技术论文。预计主要的经济和技术挑战将阻碍半导体器件的持续扩展。这导致寻找替代的机械、生物/生化、纳米级电子、异步和量子计算以及传感器技术。随着基础纳米技术在化学家、物理学家和生物学家的实验室中不断发展,计算机科学家和工程师必须将这些实验室中出现的基本构件(类似于晶体管)的潜力转化为信息系统。他们的设计将面临多重挑战,从由于纳米技术制造过程的自组装性质而导致的固有(不)可靠性,由于必须集成复杂功能的纳米器件的庞大体积导致的复杂性,以及从需要将这些新的纳米技术与硅器件集成在同一系统中。该杂志全面涵盖了由新兴技术和先进半导体构建的计算系统的规范、设计分析、模拟、验证、测试和评估方面的创新工作

期刊主页
涉及主题计算机科学工程类物理电气工程操作系统数学量子力学电子工程嵌入式系统程序设计语言材料科学算法电信光电子学生物并行计算人工智能计算机网络计算机硬件热力学
出版信息出版商: Association for Computing Machinery (ACM)出版周期: Quarterly期刊类型: journal
基本数据创刊年份: 2005原创研究文献占比98.65%自引率:4.80%Gold OA占比: 0.61%
平均审稿周期 网友分享经验:>12周,或约稿
平均录用比例网友分享经验:容易

期刊引文格式

这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。

并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。

只有1位作者的期刊

有2位作者的期刊

有3位作者的期刊

有5位以上作者的期刊

书籍引用格式

以下是创作和编辑的书籍的参考文献的示例。

学位论文引用格式

网页引用格式

这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。

专利引用格式

最新文章

HDRLPIM: A Simulator for <u>H</u> yper <u>D</u> imensional <u>R</u> einforcement <u>L</u> earning based on <u>P</u> rocessing <u>I</u> n <u>M</u> emory

2024-9-12

Exploiting the Extended Neighborhood of Hexagonal Qubit Architecture for Mapping Quantum Circuits

2024-8-20

Spiking-NeRF: Spiking Neural Network for Energy-Efficient Neural Rendering

2024-7-11

Breaking On-Chip Communication Anonymity using Flow Correlation Attacks

2024-7-10

Genetic Cache: A Machine Learning Approach to Designing DRAM Cache Controllers in HBM Systems

2024-7-8

PUF-Based Digital Money with Propagation-of-Provenance and Offline Transfers Between Two Parties

2024-5-24

SAT-based Exact Modulo Scheduling Mapping for Resource-Constrained CGRAs

2024-5-22

Towards practical superconducting accelerators for machine learning using U-SFQ

2024-4-30

An Analysis of Various Design Pathways Towards Multi-Terabit Photonic On-Interposer Interconnects

2024-2-13

Towards Energy-Efficient Spiking Neural Networks: A Robust Hybrid CMOS-Memristive Accelerator

2024-1-19

Repercussions of Using DNN Compilers on Edge GPUs for Real Time and Safety Critical Systems: A Quantitative Audit

2024-1-19

Towards Energy-Efficient Spiking Neural Networks: A Robust Hybrid CMOS-Memristive Accelerator

2023-12-5

Secure and Lightweight Authentication Protocol Using PUF for the IoT-based Wireless Sensor Network

2023-11-14

Introduction to the Special Issue on Next-Generation On-Chip and Off-Chip Communication Architectures for Edge, Cloud and HPC

2023-10-31

A Fast Object Detection-Based Framework for Via Modeling on PCB X-Ray CT Images

2023-10-11

Design-time Reference Current Generation for Robust Spintronic-based Neuromorphic Architecture

2023-9-27

An Electro-Photonic System for Accelerating Deep Neural Networks

2023-9-8

STIFT: A Spatio-Temporal Integrated Folding Tree for Efficient Reductions in Flexible DNN Accelerators

2023-9-8

Toward the Generation of Test Vectors for the Detection of Hardware Trojan Targeting Effective Switching Activity

2023-9-8

SkyBridge 2.0: A Fine-grained Vertical 3D-IC Technology for Future ICs

2023-8-31

Repercussions of Using DNN Compilers on Edge GPUs for Real Time and Safety Critical Systems: A Quantitative Audit

2023-8-3

Introduction to the Special Issue on BioFoundries and Cloud Laboratories

2023-7-31

Guest Editors Introduction: Special Issue on Network-on-Chip Architectures of the Future (NoCArc)

2023-7-27

Machine Learning Enabled Solutions for Design and Optimization Challenges in Networks-on-Chip based Multi/Many-Core Architectures

2023-6-30

Building an Open Representation for Biological Protocols

2023-6-23

Hardware IP Assurance against Trojan Attacks with Machine Learning and Post-processing

2023-6-21

Virtualizing Existing Fluidic Programs

2023-6-21

Securing Network-on-chips Against Fault-injection and Crypto-analysis Attacks via Stochastic Anonymous Routing

2023-6-21

EVHA: Explainable Vision System for Hardware Testing and Assurance—An Overview

2023-6-21

2DMAC: A Sustainable and Efficient Medium Access Control Mechanism for Future Wireless NoCs

2023-6-21

Fusing In-storage and Near-storage Acceleration of Convolutional Neural Networks

2023-6-17

A Survey on Machine Learning in Hardware Security

2023-4-30

Low-Rank Gradient Descent for Memory-Efficient Training of Deep In-Memory Arrays

2023-4-30

A Noninvasive Technique to Detect Authentic/Counterfeit SRAM Chips

2023-4-30

A Hybrid Optical-Electrical Analog Deep Learning Accelerator Using Incoherent Optical Signals

2023-4-30

FPIC: A Novel Semantic Dataset for Optical PCB Assurance

2023-4-30

Eternal-thing 2.0: Analog-Trojan-resilient Ripple-less Solar Harvesting System for Sustainable IoT

2023-3-28

<scp>AroMa</scp> : Evaluating Deep Learning Systems for Stealthy Integrity Attacks on Multi-tenant Accelerators

2023-3-25

On Securing Cryptographic ICs against Scan-based Attacks: A Hamming Weight Distribution Perspective

2023-3-25

Characterization of Timing-based Software Side-channel Attacks and Mitigations on Network-on-Chip Hardware

2023-3-2

A Mapping Method Tolerating SAF and Variation for Memristor Crossbar Array Based Neural Network Inference on Edge Devices

2023-2-25

Introduction to the Special Issue on CAD for Security: Pre-silicon Security Sign-off Solutions Through Design Cycle

2023-1-31

Survey of Approaches and Techniques for Security Verification of Computer Systems

2023-1-19

Automated Generation of Security Assertions for RTL Models

2023-1-19

On Securing Cryptographic ICs against Scan-based Attacks: A Hamming Weight Distribution Perspective

2022-12-22

Reliable Constructions for the Key Generator of Code-based Post-quantum Cryptosystems on FPGA

2022-12-9

Taming Molecular Field-Coupling for Nanocomputing Design

2022-12-9

A Neoteric Approach for Logic with Embedded Memory Leveraging Crosstalk Computing

2022-12-9

B-open Defect: A Novel Defect Model in FinFET Technology

2022-12-9

Silicon-correlated Simulation Methodology of EM Side-channel Leakage Analysis

2022-12-9

帮你贴心管理全部的文献

研飞ivySCI,高效的论文管理

投稿经验分享

分享我的经验,帮你走得更远

Built withby Ivy Science
Copyright © 2020-2024
版权所有:南京青藤格致信息科技有限公司