Akida Exploits Sparsity For Low Power in Neural Networks By Douglas McLelland, Brainchip August 21, 2025
A new era of chip-level DRC debug: Fast, scalable and AI-driven By James Paris, James Paris August 20, 2025
Physical Design Exploration of a Wire-Friendly Domain-Specific Processor for Angstrom-Era Nodes By Lorenzo Ruotolo, Politecnico di Torino August 20, 2025
Ultra Ethernet's Design Principles and Architectural Innovations By Torsten Hoefler, ETH Zurich August 20, 2025
Post-Quantum Cryptography: Why Open Source alone is Not Enough for Secure IP Deployment By Reza Azarderakhsh, PQSecure Technologies August 20, 2025
ReGate: Enabling Power Gating in Neural Processing Units By Yuqi Xue, University of Illinois Urbana-Champaign August 19, 2025
Morphlux: Programmable chip-to-chip photonic fabrics in multi-accelerator servers for ML By Abhishek Vijaya Kumar, Cornell University August 18, 2025
Security Enclave Architecture for Heterogeneous Security Primitives for Supply-Chain Attacks By Kshitij Raj, University of Florida August 13, 2025
relOBI: A Reliable Low-latency Interconnect for Tightly-Coupled On-chip Communication By Michael Rogenmoser, ETH Zurich August 12, 2025
Enabling Space-Grade AI/ML with RISC-V: A Fully European Stack for Autonomous Missions By Pablo Ghiglino, Klepsydra August 5, 2025
CANDoSA: A Hardware Performance Counter-Based Intrusion Detection System for DoS Attacks on Automotive CAN bus By Franco Oberti, Dumarey August 4, 2025
How Next-Gen Chips Are Unlocking RISC-V’s Customization Advantage By Marc Evans, Andes Technology July 24, 2025
Efficient Hardware-Assisted Heap Memory Safety for Embedded RISC-V Systems By Hyunjae Park, Inha University July 23, 2025
Automatically Retargeting Hardware and Code Generation for RISC-V Custom Instructions By Kari Hepola, Tampere University July 22, 2025
Encarsia: Evaluating CPU Fuzzers via Automatic Bug Injection By Matej Bölcskei, ETH Zurich July 15, 2025