0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (10)
  • R250 - R500 (38)
  • R500+ (3,136)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design

Advanced Boolean Techniques - Selected Papers from the 13th International Workshop on Boolean Problems (Paperback, 1st ed.... Advanced Boolean Techniques - Selected Papers from the 13th International Workshop on Boolean Problems (Paperback, 1st ed. 2020)
Rolf Drechsler, Mathias Soeken
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

This book describes recent findings in the domain of Boolean logic and Boolean algebra, covering application domains in circuit and system design, but also basic research in mathematics and theoretical computer science. Content includes invited chapters and a selection of the best papers presented at the 13th annual International Workshop on Boolean Problems. Provides a single-source reference to the state-of-the-art research in the field of logic synthesis and Boolean techniques; Includes a selection of the best papers presented at the 13th annual International Workshop on Boolean Problems; Covers Boolean algebras, Boolean logic, Boolean modeling, Combinatorial Search, Boolean and bitwise arithmetic, Software and tools for the solution of Boolean problems, Applications of Boolean logic and algebras, Applications to real-world problems, Boolean constraint solving, and Extensions of Boolean logic.

Circadian Rhythms for Future Resilient Electronic Systems - Accelerated Active Self-Healing for Integrated Circuits (Paperback,... Circadian Rhythms for Future Resilient Electronic Systems - Accelerated Active Self-Healing for Integrated Circuits (Paperback, 1st ed. 2020)
Xinfei Guo, Mircea R Stan
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

This book describes methods to address wearout/aging degradations in electronic chips and systems, caused by several physical mechanisms at the device level. The authors introduce a novel technique called accelerated active self-healing, which fixes wearout issues by enabling accelerated recovery. Coverage includes recovery theory, experimental results, implementations and applications, across multiple nodes ranging from planar, FD-SOI to FinFET, based on both foundry provided models and predictive models. Presents novel techniques, tested with experiments on real hardware; Discusses circuit and system level wearout recovery implementations, many of these designs are portable and friendly to the standard design flow; Provides circuit-architecture-system infrastructures that enable the accelerated self-healing for future resilient systems; Discusses wearout issues at both transistor and interconnect level, providing solutions that apply to both; Includes coverage of resilient aspects of emerging applications such as IoT.

A Practical Introduction to Enterprise Network and Security Management (Paperback, 2nd edition): Bongsik Shin A Practical Introduction to Enterprise Network and Security Management (Paperback, 2nd edition)
Bongsik Shin
R1,523 Discovery Miles 15 230 Ships in 12 - 17 working days

A Practical Introduction to Enterprise Network and Security Management, Second Edition, provides a balanced understanding of introductory and advanced subjects in both computer networking and cybersecurity. Although much of the focus is on technical concepts, managerial issues related to enterprise network and security planning and design are explained from a practitioner's perspective. Because of the critical importance of cybersecurity in today's enterprise networks, security-related issues are explained throughout the book, and four chapters are dedicated to fundamental knowledge. Challenging concepts are explained so readers can follow through with careful reading. This book is written for those who are self-studying or studying information systems or computer science in a classroom setting. If used for a course, it has enough material for a semester or a quarter. FEATURES Provides both theoretical and practical hands-on knowledge and learning experiences for computer networking and cybersecurity Offers a solid knowledge base for those preparing for certificate tests, such as CompTIA and CISSP Takes advantage of actual cases, examples, industry products, and services so students can relate concepts and theories to practice Explains subjects in a systematic and practical manner to facilitate understanding Includes practical exercise questions that can be individual or group assignments within or without a classroom Contains several information-rich screenshots, figures, and tables carefully constructed to solidify concepts and enhance visual learning The text is designed for students studying information systems or computer science for the first time. As a textbook, this book includes hands-on assignments based on the Packet Tracer program, an excellent network design and simulation tool from Cisco. Instructor materials also are provided, including PowerPoint slides, solutions for exercise questions, and additional chapter questions from which to build tests.

Organizational Network Analysis - Auditing Intangible Resources (Paperback): Anna Ujwary-Gil Organizational Network Analysis - Auditing Intangible Resources (Paperback)
Anna Ujwary-Gil
R1,331 Discovery Miles 13 310 Ships in 12 - 17 working days

This book makes a significant contribution to the development of management sciences, in terms of strategic management and more strictly resource approach to the company through structural definition of knowledge.

Computer Architecture (Hardcover): Ken Spiner Computer Architecture (Hardcover)
Ken Spiner
R3,477 R3,142 Discovery Miles 31 420 Save R335 (10%) Ships in 10 - 15 working days
Emerging Topics in Hardware Security (Hardcover, 1st ed. 2021): Mark Tehranipoor Emerging Topics in Hardware Security (Hardcover, 1st ed. 2021)
Mark Tehranipoor
R3,247 Discovery Miles 32 470 Ships in 10 - 15 working days

This book provides an overview of emerging topics in the field of hardware security, such as artificial intelligence and quantum computing, and highlights how these technologies can be leveraged to secure hardware and assure electronics supply chains. The authors are experts in emerging technologies, traditional hardware design, and hardware security and trust. Readers will gain a comprehensive understanding of hardware security problems and how to overcome them through an efficient combination of conventional approaches and emerging technologies, enabling them to design secure, reliable, and trustworthy hardware.

Network-on-Chip Security and Privacy (Hardcover, 1st ed. 2021): Prabhat Mishra, Subodha Charles Network-on-Chip Security and Privacy (Hardcover, 1st ed. 2021)
Prabhat Mishra, Subodha Charles
R3,457 Discovery Miles 34 570 Ships in 10 - 15 working days

This book provides comprehensive coverage of Network-on-Chip (NoC) security vulnerabilities and state-of-the-art countermeasures, with contributions from System-on-Chip (SoC) designers, academic researchers and hardware security experts. Readers will gain a clear understanding of the existing security solutions for on-chip communication architectures and how they can be utilized effectively to design secure and trustworthy systems.

In-Memory Computing - Synthesis and Optimization (Paperback, 1st ed. 2020): Saeideh Shirinzadeh, Rolf Drechsler In-Memory Computing - Synthesis and Optimization (Paperback, 1st ed. 2020)
Saeideh Shirinzadeh, Rolf Drechsler
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

This book describes a comprehensive approach for synthesis and optimization of logic-in-memory computing hardware and architectures using memristive devices, which creates a firm foundation for practical applications. Readers will get familiar with a new generation of computer architectures that potentially can perform faster, as the necessity for communication between the processor and memory is surpassed. The discussion includes various synthesis methodologies and optimization algorithms targeting implementation cost metrics including latency and area overhead as well as the reliability issue caused by short memory lifetime. Presents a comprehensive synthesis flow for the emerging field of logic-in-memory computing; Describes automated compilation of programmable logic-in-memory computer architectures; Includes several effective optimization algorithm also applicable to classical logic synthesis; Investigates unbalanced write traffic in logic-in-memory architectures and describes wear leveling approaches to alleviate it.

Architectural Wireless Networks Solutions and Security Issues (Hardcover, 1st ed. 2021): Santosh Kumar Das, Sourav Samanta,... Architectural Wireless Networks Solutions and Security Issues (Hardcover, 1st ed. 2021)
Santosh Kumar Das, Sourav Samanta, Nilanjan Dey, Bharat S. Patel, Aboul Ella Hassanien
R5,132 Discovery Miles 51 320 Ships in 10 - 15 working days

This book presents architectural solutions of wireless network and its variations. It basically deals with modeling, analysis, design and enhancement of different architectural parts of wireless network. The main aim of this book is to enhance the applications of wireless network by reducing and controlling its architectural issues. The book discusses efficiency and robustness of wireless network as a platform for communication and data transmission and also discusses some challenges and security issues such as limited hardware resources, unreliable communication, dynamic topology of some wireless networks, vulnerability and unsecure environment. This book is edited for users, academicians and researchers of wireless network. Broadly, topics include modeling of security enhancements, optimization model for network lifetime, modeling of aggregation systems and analyzing of troubleshooting techniques.

Embedded Systems - A Hardware-Software Co-Design Approach - Unleash the Power of Arduino! (Hardcover, 1st ed. 2021): Bashir I... Embedded Systems - A Hardware-Software Co-Design Approach - Unleash the Power of Arduino! (Hardcover, 1st ed. 2021)
Bashir I Morshed
R2,162 Discovery Miles 21 620 Ships in 10 - 15 working days

This textbook introduces the concept of embedded systems with exercises using Arduino Uno. It is intended for advanced undergraduate and graduate students in computer science, computer engineering, and electrical engineering programs. It contains a balanced discussion on both hardware and software related to embedded systems, with a focus on co-design aspects. Embedded systems have applications in Internet-of-Things (IoT), wearables, self-driving cars, smart devices, cyberphysical systems, drones, and robotics. The hardware chapter discusses various microcontrollers (including popular microcontroller hardware examples), sensors, amplifiers, filters, actuators, wired and wireless communication topologies, schematic and PCB designs, and much more. The software chapter describes OS-less programming, bitmath, polling, interrupt, timer, sleep modes, direct memory access, shared memory, mutex, and smart algorithms, with lots of C-code examples for Arduino Uno. Other topics discussed are prototyping, testing, verification, reliability, optimization, and regulations. Appropriate for courses on embedded systems, microcontrollers, and instrumentation, this textbook teaches budding embedded system programmers practical skills with fun projects to prepare them for industry products. Introduces embedded systems for wearables, Internet-of-Things (IoT), robotics, and other smart devices; Offers a balanced focus on both hardware and software co-design of embedded systems; Includes exercises, tutorials, and assignments.

Design for Testability, Debug and Reliability - Next Generation Measures Using Formal Techniques (Hardcover, 1st ed. 2021):... Design for Testability, Debug and Reliability - Next Generation Measures Using Formal Techniques (Hardcover, 1st ed. 2021)
Sebastian Huhn, Rolf Drechsler
R3,119 Discovery Miles 31 190 Ships in 10 - 15 working days

This book introduces several novel approaches to pave the way for the next generation of integrated circuits, which can be successfully and reliably integrated, even in safety-critical applications. The authors describe new measures to address the rising challenges in the field of design for testability, debug, and reliability, as strictly required for state-of-the-art circuit designs. In particular, this book combines formal techniques, such as the Satisfiability (SAT) problem and the Bounded Model Checking (BMC), to address the arising challenges concerning the increase in test data volume, as well as test application time and the required reliability. All methods are discussed in detail and evaluated extensively, while considering industry-relevant benchmark candidates. All measures have been integrated into a common framework, which implements standardized software/hardware interfaces.

Microservices in SAP HANA XSA - A Guide to REST APIs Using Node.js (Paperback, 1st ed.): Sergio Guerrero Microservices in SAP HANA XSA - A Guide to REST APIs Using Node.js (Paperback, 1st ed.)
Sergio Guerrero
R1,182 R989 Discovery Miles 9 890 Save R193 (16%) Ships in 10 - 15 working days

Build enterprise-grade microservices in the SAP HANA Advanced Model (XSA). This book explains building scalable APIs in XSA and the benefits of building microservices with SAP HANA XSA. This book covers the cloud foundry (CF) architecture and how SAP HANA XSA follows the model. It begins with the details of the different architectural layers of applications hosted in XSA (specifically, microservices). Everything you need to know is presented, including analyzing requests, modularization, database ingestion, building JSON responses, and scaling your microservices. You will learn to use developmental tools such as the SAP WEB IDE, POSTMAN, and the SAP HANA Cockpit for XSA, including debugging examples on SAP HANA XSA with code snippets showing how microservices can be developed, debugged, scaled, and deployed on SAP HANA XSA. Microservices are divided into security and authentication, request handling, modularization of Node.js, and interaction with the SAP HANA database containers and response formatting. An end-to-end scenario is presented of a Node.js REST API that uses HTTP methods, concluding with deploying an SAP HANA XSA project to a production environment. This book is simple enough to help you implement a Node.js module in order to understand the development of microservices, and complex enough for architects to design their next business-ready solution integrating UAA security, application modularization, and an end-to-end REST API on SAP HANA XSA. What You Will Learn Know the definition and architecture of cloud foundry and its application on SAP HANA XSA Understand REST principles and different HTTP methods Explore microservices (Node.js) development Database interaction from Node (executing SQL statements and stored procedures) Who This Book Is For Architects designing business-ready solutions that integrate UAA security, application modularization, and an end-to-end REST API on SAP HANA XSA

Performance of Computer Communication Systems - A Model-Based Approach (Hardcover): B.R. Haverkort Performance of Computer Communication Systems - A Model-Based Approach (Hardcover)
B.R. Haverkort
R4,275 Discovery Miles 42 750 Ships in 12 - 17 working days

Performance of Computer Communication Systems A Model-Based Approach Boudewijn R. Haverkort Rheinisch-WestfAlische Technische Hochschule Aachen, Germany Computer communication systems and distributed systems are now able to provide an increasing range of services. As the timing requirements in the operation of these services are becoming crucial for the global community. performance assessment and selection of communication and distributed systems are, therefore, becoming more important. In this book, the author illustrates the techniques and methods used to evaluate the performance of computer communication systems, thereby covering all aspects of model-based performance evaluation. Unlike other books on this topic, there is no restriction to a particular performance evaluation technique. Notable features in this book include:
* coverage of all major techniques of performance evaluation
* non-mathematical problem solving approach, explaining and illustrating performance evaluation techniques
* assessment techniques for stochastic processes, single server queues, networks of queues and stochastic Petri nets
* numerous application studies, including token ring systems, client-server systems, and wide-area networks
* substantial number of practical exercises and examples.
For computer or electrical engineers who design and implement computer communication systems, this book provides an excellent overview of the methods and techniques used to construct and solve performance models. It is also a valuable source of information for postgraduate students in computer science and related subjects. Visit Our Web Page! http: //www.wiley.com/

Fundamentals of High Frequency CMOS Analog Integrated Circuits (Hardcover, 2nd ed. 2021): Duran Leblebici, Yusuf Leblebici Fundamentals of High Frequency CMOS Analog Integrated Circuits (Hardcover, 2nd ed. 2021)
Duran Leblebici, Yusuf Leblebici
R2,713 Discovery Miles 27 130 Ships in 10 - 15 working days

This textbook is ideal for senior undergraduate and graduate courses in RF CMOS circuits, RF circuit design, and high-frequency analog circuit design. It is aimed at electronics engineering students and IC design engineers in the field, wishing to gain a deeper understanding of circuit fundamentals, and to go beyond the widely-used automated design procedures. The authors employ a design-centric approach, in order to bridge the gap between fundamental analog electronic circuits textbooks and more advanced RF IC design texts. The structure and operation of the building blocks of high-frequency ICs are introduced in a systematic manner, with an emphasis on transistor-level operation, the influence of device characteristics and parasitic effects, and input-output behavior in the time and frequency domains. This second edition has been revised extensively, to expand some of the key topics, to clarify the explanations, and to provide extensive design examples and problems. New material has been added for basic coverage of core topics, such as wide-band LNAs, noise feedback concept and noise cancellation, inductive-compensated band widening techniques for flat-gain or flat-delay characteristics, and basic communication system concepts that exploit the convergence and co-existence of Analog and Digital building blocks in RF systems. A new chapter (Chapter 5) has been added on Noise and Linearity, addressing key topics in a comprehensive manner. All of the other chapters have also been revised and largely re-written, with the addition of numerous, solved design examples and exercise problems.

Physical Assurance - For Electronic Devices and Systems (Hardcover, 1st ed. 2021): Navid Asadizanjani, Mir Tanjidur Rahman,... Physical Assurance - For Electronic Devices and Systems (Hardcover, 1st ed. 2021)
Navid Asadizanjani, Mir Tanjidur Rahman, Mark Tehranipoor
R3,125 Discovery Miles 31 250 Ships in 10 - 15 working days

This book provides readers with a comprehensive introduction to physical inspection-based approaches for electronics security. The authors explain the principles of physical inspection techniques including invasive, non-invasive and semi-invasive approaches and how they can be used for hardware assurance, from IC to PCB level. Coverage includes a wide variety of topics, from failure analysis and imaging, to testing, machine learning and automation, reverse engineering and attacks, and countermeasures.

Wireless Communication Electronics by Example (Hardcover, 2nd ed. 2021): Robert Sobot Wireless Communication Electronics by Example (Hardcover, 2nd ed. 2021)
Robert Sobot
R2,729 Discovery Miles 27 290 Ships in 10 - 15 working days

This book is intended for senior undergraduate and graduate students as well as practicing engineers who are involved in design and analysis of radio frequency (RF) circuits. Fully-solved, tutorial-like examples are used to put into practice major topics and to understand the underlying principles of the main sub-circuits required to design an RF transceiver and the whole communication system. Starting with review of principles in electromagnetic (EM) transmission and signal propagation, through detailed practical analysis of RF amplifier, mixer, modulator, demodulator, and oscillator circuit topologies, as well as basics of the system communication theory, this book systematically covers most relevant aspects in a way that is suitable for a single semester university level course. Readers will benefit from the author's sharp focus on radio receiver design, demonstrated through hundreds of fully-solved, realistic examples, as opposed to texts that cover many aspects of electronics and electromagnetic without making the required connection to wireless communication circuit design. Offers readers a complete, self-sufficient tutorial style textbook; Includes all relevant topics required to study and design an RF receiver in a consistent, coherent way with appropriate depth for a one-semester course; Uses hundreds of fully-solved, realistic examples of radio design technology to demonstrate concepts; Explains necessary physical/mathematical concepts and their interrelationship.

Hardware Supply Chain Security - Threat Modelling, Emerging Attacks and Countermeasures (Hardcover, 1st ed. 2021): Basel Halak Hardware Supply Chain Security - Threat Modelling, Emerging Attacks and Countermeasures (Hardcover, 1st ed. 2021)
Basel Halak
R3,379 Discovery Miles 33 790 Ships in 10 - 15 working days

This book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system. The authors present a case study on a new type of security attack, which combines two forms of attack mechanisms from two different stages of the IC supply chain. More specifically, this attack targets the newly developed, light cipher (Ascon) and demonstrates how it can be broken easily, when its implementation is compromised with a hardware Trojan. This book also discusses emerging countermeasures, including anti-counterfeit design techniques for resources constrained devices and anomaly detection methods for embedded systems.

Authentication of Embedded Devices - Technologies, Protocols and Emerging Applications (Hardcover, 1st ed. 2021): Basel Halak Authentication of Embedded Devices - Technologies, Protocols and Emerging Applications (Hardcover, 1st ed. 2021)
Basel Halak
R2,632 Discovery Miles 26 320 Ships in 10 - 15 working days

This book provides comprehensive coverage of state-of-the-art integrated circuit authentication techniques, including technologies, protocols and emerging applications. The authors first discuss emerging solutions for embedding unforgeable identifies into electronics devices, using techniques such as IC fingerprinting, physically unclonable functions and voltage-over-scaling. Coverage then turns to authentications protocols, with a special focus on resource-constrained devices, first giving an overview of the limitation of existing solutions and then presenting a number of new protocols, which provide better physical security and lower energy dissipation. The third part of the book focuses on emerging security applications for authentication schemes, including securing hardware supply chains, hardware-based device attestation and GPS spoofing attack detection and survival. Provides deep insight into the security threats undermining existing integrated circuit authentication techniques; Includes an in-depth discussion of the emerging technologies used to embed unforgeable identifies into electronics systems; Offers a comprehensive summary of existing authentication protocols and their limitations; Describes state-of-the-art authentication protocols that provide better physical security and more efficient energy consumption; Includes detailed case studies on the emerging applications of IC authentication schemes.

State Machines using VHDL - FPGA Implementation of Serial Communication and Display Protocols (Hardcover, 1st ed. 2021):... State Machines using VHDL - FPGA Implementation of Serial Communication and Display Protocols (Hardcover, 1st ed. 2021)
Orhangazi, A.Cagri Arli
R2,668 Discovery Miles 26 680 Ships in 10 - 15 working days

This textbook teaches students techniques for the design of advanced digital systems using Field Programmable Gate Arrays (FPGAs). The authors focus on communication between FPGAs and peripheral devices (such as EEPROM, analog-to-digital converters, sensors, digital-to-analog converters, displays etc.) and in particular state machines and timed state machines for the implementation of serial communication protocols, such as UART, SPI, I(2)C, and display protocols, such as VGA, HDMI. VHDL is used as the programming language and all topics are covered in a structured, step-by-step manner.

High-speed Serial Buses in Embedded Systems (Paperback, 1st ed. 2020): Feng Zhang High-speed Serial Buses in Embedded Systems (Paperback, 1st ed. 2020)
Feng Zhang
R3,636 Discovery Miles 36 360 Ships in 10 - 15 working days

This book describes the most frequently used high-speed serial buses in embedded systems, especially those used by FPGAs. These buses employ SerDes, JESD204, SRIO, PCIE, Aurora and SATA protocols for chip-to-chip and board-to-board communication, and CPCIE, VPX, FC and Infiniband protocols for inter-chassis communication. For each type, the book provides the bus history and version info, while also assessing its advantages and limitations. Furthermore, it offers a detailed guide to implementing these buses in FPGA design, from the physical layer and link synchronization to the frame format and application command. Given its scope, the book offers a valuable resource for researchers, R&D engineers and graduate students in computer science or electronics who wish to learn the protocol principles, structures and applications of high-speed serial buses.

ASIC Design and Synthesis - RTL Design Using Verilog (Hardcover, 1st ed. 2021): Vaibbhav Taraate ASIC Design and Synthesis - RTL Design Using Verilog (Hardcover, 1st ed. 2021)
Vaibbhav Taraate
R5,625 Discovery Miles 56 250 Ships in 10 - 15 working days

This book describes simple to complex ASIC design practical scenarios using Verilog. It builds a story from the basic fundamentals of ASIC designs to advanced RTL design concepts using Verilog. Looking at current trends of miniaturization, the contents provide practical information on the issues in ASIC design and synthesis using Synopsys DC and their solution. The book explains how to write efficient RTL using Verilog and how to improve design performance. It also covers architecture design strategies, multiple clock domain designs, low-power design techniques, DFT, pre-layout STA and the overall ASIC design flow with case studies. The contents of this book will be useful to practicing hardware engineers, students, and hobbyists looking to learn about ASIC design and synthesis.

Dual Mode Logic - A New Paradigm for Digital IC Design (Hardcover, 1st ed. 2021): Itamar Levi, Alexander Fish Dual Mode Logic - A New Paradigm for Digital IC Design (Hardcover, 1st ed. 2021)
Itamar Levi, Alexander Fish
R2,631 Discovery Miles 26 310 Ships in 10 - 15 working days

This book presents Dual Mode Logic (DML), a new design paradigm for digital integrated circuits. DML logic gates can operate in two modes, each optimized for a different metric. Its on-the-fly switching between these operational modes at the gate, block and system levels provide maximal E-D optimization flexibility. Each highly detailed chapter has multiple illustrations showing how the DML paradigm seamlessly implements digital circuits that dissipate less energy while simultaneously improving performance and reducing area without a significant compromise in reliability. All the facets of the DML methodology are covered, starting from basic concepts, through single gate optimization, general module optimization, design trade-offs and new ways DML can be integrated into standard design flows using standard EDA tools. DML logic is compatible with numerous applications but is particularly advantageous for ultra-low power, reliable high performance systems, and advanced scaled technologies Written in language accessible to students and design engineers, each topic is oriented toward immediate application by all those interested in an alternative to CMOS logic. Describes a novel, promising alternative to conventional CMOS logic, known as Dual Mode Logic (DML), with which a single gate can be operated selectively in two modes, each optimized for a different metric (e.g., energy consumption, performance, size); Demonstrates several techniques at the architectural level, which can result in high energy savings and improved system performance; Focuses on the tradeoffs between power, area and speed including optimizations at the transistor and gate level, including alternatives to DML basic cells; Illustrates DML efficiency for a variety of VLSI applications.

Towards Ubiquitous Low-power Image Processing Platforms (Hardcover, 1st ed. 2021): Magnus Jahre, Diana Goehringer, Philippe... Towards Ubiquitous Low-power Image Processing Platforms (Hardcover, 1st ed. 2021)
Magnus Jahre, Diana Goehringer, Philippe Millet
R3,636 Discovery Miles 36 360 Ships in 10 - 15 working days

This book summarizes the key scientific outcomes of the Horizon 2020 research project TULIPP: Towards Ubiquitous Low-power Image Processing Platforms. The main focus lies on the development of high-performance, energy-efficient embedded systems for the growing range of increasingly complex image processing applications. The holistic TULIPP approach is described in the book, which addresses hardware platforms, programming tools and embedded operating systems. Several of the results are available as open-source hardware/software for the community. The results are evaluated with several use cases taken from real-world applications in key domains such as Unmanned Aerial Vehicles (UAVs), robotics, space and medicine. Discusses the development of high-performance, energy-efficient embedded systems for the growing range of increasingly complex image processing applications; Covers the hardware architecture of embedded image processing systems, novel methods, tools and libraries for programming those systems as well as embedded operating systems to manage those systems; Demonstrates results with several challenging applications, such as medical systems, robotics, drones and automotive.

Soft Error Reliability Using Virtual Platforms - Early Evaluation of Multicore Systems (Hardcover, 1st ed. 2020): Felipe Rocha... Soft Error Reliability Using Virtual Platforms - Early Evaluation of Multicore Systems (Hardcover, 1st ed. 2020)
Felipe Rocha da Rosa, Luciano Ost, Ricardo Reis
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

This book describes the benefits and drawbacks inherent in the use of virtual platforms (VPs) to perform fast and early soft error assessment of multicore systems. The authors show that VPs provide engineers with appropriate means to investigate new and more efficient fault injection and mitigation techniques. Coverage also includes the use of machine learning techniques (e.g., linear regression) to speed-up the soft error evaluation process by pinpointing parameters (e.g., architectural) with the most substantial impact on the software stack dependability. This book provides valuable information and insight through more than 3 million individual scenarios and 2 million simulation-hours. Further, this book explores machine learning techniques usage to navigate large fault injection datasets.

Security and Privacy in the Internet of Things (Hardcover): Syed Rameem Zahra, Mohammad Ahsan Chishti Security and Privacy in the Internet of Things (Hardcover)
Syed Rameem Zahra, Mohammad Ahsan Chishti
R3,403 Discovery Miles 34 030 Ships in 12 - 17 working days

This book provides a comprehensive study of the security and privacy research advancements in Internet of Things (IoT). The book lays the context for discussion by introducing the vulnerable intrinsic features of IoT. By providing a comprehensive discussion of the vulnerable features, the book highlights the problem areas of IoT related to security and privacy. * Covers all aspects of security * Algorithms, protocols and technologies used in IoT have been explained and the security flaws in them analyzed with solutions * Discusses ways for achieving better access control and trust in the IoT ecosystem * Contributes exhaustive strategic plans to deal with security issues of IoT * Gathers contributions from leading-edge researchers from academia and industry Graduates, researchers, people from the industry and security professionals who want to explore the IoT security field will find this book useful. The book will give an in-depth insight in to what has happened, what new is happening and what opportunities exist in the field.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Healing Roots - Anthropology in Life and…
Julie Laplante Paperback R863 Discovery Miles 8 630
Craftmanship & Art - an Anthropological…
Philip K. Dark Hardcover R1,659 Discovery Miles 16 590
Rich Pickings Out Of The Past
Bernard Makgabo Ngoepe Paperback  (1)
R348 Discovery Miles 3 480
Almanac of African Peoples & Nations
Mohamad Yakan Hardcover R4,389 Discovery Miles 43 890
Witches and Demons - A Comparative…
Jean La Fontaine Hardcover R2,893 Discovery Miles 28 930
Recalling the Belgian Congo…
Marie-Benedicte Dembour Hardcover R2,897 Discovery Miles 28 970
Durkheim in Dialogue - A Centenary…
Sondra L Hausner Paperback R857 Discovery Miles 8 570
Hillbilly Elegy - A Memoir of a Family…
J D Vance Paperback  (1)
R316 R268 Discovery Miles 2 680
RLE: Japan Mini-Set E: Sociology…
Various Hardcover R29,292 Discovery Miles 292 920
Tikopia Collected: Raymond Firth and the…
Elizabeth Bonshek Hardcover R2,096 Discovery Miles 20 960

 

Partners