Login / Signup

Optimizing the location of ECC protection in network-on-chip.

Junshi WangLetian HuangQiang LiGuangjun LiAxel Jantsch
Published in: CODES+ISSS (2016)
Keyphrases
  • network on chip
  • routing algorithm
  • network simulator
  • information security
  • multi processor
  • belief propagation
  • end to end