Malik, Sharad
230  results:
Search for persons X
?
1

Application-level Validation of Accelerator Designs Using a..:

Huang, Bo-Yuan ; Lyubomirsky, Steven ; Li, Yi...
ACM Transactions on Design Automation of Electronic Systems.  29 (2024)  2 - p. 1-25 , 2024
 
?
2

Exact Scheduling to Minimize Off-Chip Data Movement for Dee..:

, In: 2024 29th Asia and South Pacific Design Automation Conference (ASP-DAC),
Li, Yi ; Gupta, Aarti ; Malik, Sharad - p. 908-914 , 2024
 
?
3

SoC Protocol Implementation Verification Using Instruction-..:

Lu, Huaixi ; Xing, Yue ; Gupta, Aarti.
ACM Transactions on Design Automation of Electronic Systems.  28 (2023)  6 - p. 1-24 , 2023
 
?
4

INVITED: Generalizing the ISA to the ILA: A Software/Hardwa..:

, In: 2023 60th ACM/IEEE Design Automation Conference (DAC),
 
?
5

Security Verification of Low-Trust Architectures:

, In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security,
Tan, Qinhan ; Fisseha, Yonathan ; Chen, Shibo... - p. 945-959 , 2023
 
?
6

CNNFlow: Memory-driven Data Flow Optimization for Convoluti..:

Nie, Qi ; Malik, Sharad
ACM Transactions on Design Automation of Electronic Systems.  28 (2023)  3 - p. 1-36 , 2023
 
?
7

Compositional Verification Using a Formal Component and Int..:

, In: Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design,
Xing, Yue ; Lu, Huaixi ; Gupta, Aarti. - p. 1-9 , 2022
 
?
8

Generalizing Tandem Simulation: Connecting High-level and R..:

, In: 2022 27th Asia and South Pacific Design Automation Conference (ASP-DAC),
Xing, Yue ; Gupta, Aarti ; Malik, Sharad - p. 154-159 , 2022
 
?
9

Usage-Based RTL Subsetting for Hardware Accelerators:

, In: Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design,
Tan, Qinhan ; Gupta, Aarti ; Malik, Sharad - p. 1-9 , 2022
 
?
10

ADA, the Center for Applications Driving Architectures: acc..:

, In: Proceedings of the 59th ACM/IEEE Design Automation Conference,
Bertacco, Valeria ; Austin, Todd ; Brooks, David... - p. 1406-1409 , 2022
 
?
11

Software-driven Security Attacks: From Vulnerability Source..:

Biernacki, Lauren ; Gallagher, Mark ; Xu, Zhixing...
ACM Journal on Emerging Technologies in Computing Systems.  17 (2021)  3 - p. 1-38 , 2021
 
?
12

Software-driven Security Attacks: From Vulnerability Source..:

Biernacki, Lauren ; Gallagher, Mark ; Xu, Zhixing...
ACM Journal on Emerging Technologies in Computing Systems (JETC).  17 (2021)  3 - p. 1-38 , 2021
 
?
13

Syntax-Guided Synthesis for Lemma Generation in Hardware Mo..:

, In: Lecture Notes in Computer Science; Verification, Model Checking, and Abstract Interpretation,
Zhang, Hongce ; Gupta, Aarti ; Malik, Sharad - p. 325-349 , 2021
 
?
14

Synthesizing Environment Invariants for Modular Hardware Ve..:

, In: Lecture Notes in Computer Science; Verification, Model Checking, and Abstract Interpretation,
Zhang, Hongce ; Yang, Weikun ; Fedyukovich, Grigory.. - p. 202-225 , 2020
 
?
15

ILAng: A Modeling and Verification Platform for SoCs Using ..:

, In: Tools and Algorithms for the Construction and Analysis of Systems; Lecture Notes in Computer Science,
Huang, Bo-Yuan ; Zhang, Hongce ; Gupta, Aarti. - p. 351-357 , 2019
 
1-15