[ C7 ] A. Ehret, K. M. Gettings, B. R. Jordan Jr. and M. A. Kinsy: “A Hardware Root-of-Trust Design for Low-Power SoC Edge Devices”. In the 2020 IEEE High Performance Extreme Computing Conference (HPEC), 2020. [Outstanding Student Paper Award]
[ C6 ] X. Wang, B. Williams, J. D. Leidel, A. Ehret, M. A. Kinsy and Y. Chen: “Remote Atomic Extension (RAE) for Scalable High Performance Computing”, In the 57th ACM/EDAC/IEEE Design Automation Conference (DAC), 2020.
[ W2 ] M. A. Kinsy, D. Kava, A. Ehret and M. Mark: “Sphinx: A Secure Architecture Based on Binary Code Diversification and Execution Obfuscation”. Boston Area Architecture 2018 Workshop (BARC18), 2018.[Paper] [BibTex]
[ C5 ] S. Bandara, A. Ehret, D. Kava and M. A. Kinsy: “BRISC-V: An Open-Source Architecture Design Space Exploration Toolbox (Extended Abstract)”, 27th ACM/SIGDA International Symposium on Field-Programmable Gate Arrays (FPGA), 2019.[Paper] [BibTex]
[ C4 ] M. Isakov, A. Ehret and M. Kinsy: “Chameleon: A Generalized Reconfigurable Open-Source Architecture for Deep Neural Network Training”. In the 2018 IEEE High Performance Extreme Computing Conference (HPEC), 2018.[Paper] [BibTex] Best Student Paper Nominee
[ C3 ] M. Isakov, A. Ehret and M. Kinsy: “ClosNets: Batchless DNN Training with On-Chip A Priori Sparse Neural Topologies”. In the International conference on Field Programmable Logic and Applications (FPL), 2018.[Paper] [BibTex]
[ C2 ] A. Ehret, M. Isakov and M. A. Kinsy: “Towards a Generalized Reconfigurable Agent Based Architecture: Stock Market Simulation Acceleration”, International Conference on Reconfigurable Computing and FPGAs (ReConFig), 2018.[Paper] [BibTex]
[ C1 ] A. Ehret, P. Jamieson and M. A. Kinsy: “Scalable Open-Source Reconfigurable Architecture for Bacterial Quorum Sensing Simulations”, International Symposium on Highly Efficient Accelerators and Reconfigurable Technologies (HEART), 2018.[Paper] [BibTex]
Downloadable documents are presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.