0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
Status
Brand

Showing 1 - 16 of 16 matches in All Departments

Post-Silicon Validation and Debug (Hardcover, 1st ed. 2019): Prabhat Mishra, Farimah Farahmandi Post-Silicon Validation and Debug (Hardcover, 1st ed. 2019)
Prabhat Mishra, Farimah Farahmandi
R3,732 Discovery Miles 37 320 Ships in 12 - 17 working days

This book provides a comprehensive coverage of System-on-Chip (SoC) post-silicon validation and debug challenges and state-of-the-art solutions with contributions from SoC designers, academic researchers as well as SoC verification experts. The readers will get a clear understanding of the existing debug infrastructure and how they can be effectively utilized to verify and debug SoCs.

Network-on-Chip Security and Privacy (Hardcover, 1st ed. 2021): Prabhat Mishra, Subodha Charles Network-on-Chip Security and Privacy (Hardcover, 1st ed. 2021)
Prabhat Mishra, Subodha Charles
R3,566 Discovery Miles 35 660 Ships in 10 - 15 working days

This book provides comprehensive coverage of Network-on-Chip (NoC) security vulnerabilities and state-of-the-art countermeasures, with contributions from System-on-Chip (SoC) designers, academic researchers and hardware security experts. Readers will gain a clear understanding of the existing security solutions for on-chip communication architectures and how they can be utilized effectively to design secure and trustworthy systems.

System-on-Chip Security - Validation and Verification (Hardcover, 1st ed. 2020): Farimah Farahmandi, Yuanwen Huang, Prabhat... System-on-Chip Security - Validation and Verification (Hardcover, 1st ed. 2020)
Farimah Farahmandi, Yuanwen Huang, Prabhat Mishra; Contributions by Fareena Saqib, Jim Plusquellic
R3,250 Discovery Miles 32 500 Ships in 10 - 15 working days

This book describes a wide variety of System-on-Chip (SoC) security threats and vulnerabilities, as well as their sources, in each stage of a design life cycle. The authors discuss a wide variety of state-of-the-art security verification and validation approaches such as formal methods and side-channel analysis, as well as simulation-based security and trust validation approaches. This book provides a comprehensive reference for system on chip designers and verification and validation engineers interested in verifying security and trust of heterogeneous SoCs.

Hardware IP Security and Trust (Paperback, Softcover reprint of the original 1st ed. 2017): Prabhat Mishra, Swarup Bhunia, Mark... Hardware IP Security and Trust (Paperback, Softcover reprint of the original 1st ed. 2017)
Prabhat Mishra, Swarup Bhunia, Mark Tehranipoor
R2,980 Discovery Miles 29 800 Ships in 10 - 15 working days

This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs.

Hardware IP Security and Trust (Hardcover, 1st ed. 2017): Prabhat Mishra, Swarup Bhunia, Mark Tehranipoor Hardware IP Security and Trust (Hardcover, 1st ed. 2017)
Prabhat Mishra, Swarup Bhunia, Mark Tehranipoor
R5,564 Discovery Miles 55 640 Ships in 10 - 15 working days

This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs.

Functional Verification of Programmable Embedded Architectures - A Top-Down Approach (Paperback, 2005 ed.): Prabhat Mishra,... Functional Verification of Programmable Embedded Architectures - A Top-Down Approach (Paperback, 2005 ed.)
Prabhat Mishra, Nikil D. Dutt
R2,957 Discovery Miles 29 570 Ships in 10 - 15 working days

It is widely acknowledged that the cost of validation and testing comprises a s- nificant percentage of the overall development costs for electronic systems today, and is expected to escalate sharply in the future. Many studies have shown that up to 70% of the design development time and resources are spent on functional verification. Functional errors manifest themselves very early in the design flow, and unless they are detected up front, they can result in severe consequence- both financially and from a safety viewpoint. Indeed, several recent instances of high-profile functional errors (e. g. , the Pentium FDIV bug) have resulted in - creased attention paid to verifying the functional correctness of designs. Recent efforts have proposed augmenting the traditional RTL simulation-based validation methodology with formal techniques in an attempt to uncover hard-to-find c- ner cases, with the goal of trying to reach RTL functional verification closure. However, what is often not highlighted is the fact that in spite of the tremendous time and effort put into such efforts at the RTL and lower levels of abstraction, the complexity of contemporary embedded systems makes it difficult to guarantee functional correctness at the system level under all possible operational scenarios. The problem is exacerbated in current System-on-Chip (SOC) design meth- ologies that employ Intellectual Property (IP) blocks composed of processor cores, coprocessors, and memory subsystems. Functional verification becomes one of the major bottlenecks in the design of such systems.

System-Level Validation - High-Level Modeling and Directed Test Generation Techniques (Paperback): Mingsong Chen, Xiaoke Qin,... System-Level Validation - High-Level Modeling and Directed Test Generation Techniques (Paperback)
Mingsong Chen, Xiaoke Qin, Heon-Mo Koo, Prabhat Mishra
R3,998 Discovery Miles 39 980 Ships in 10 - 15 working days

This book covers state-of-the art techniques for high-level modeling and validation of complex hardware/software systems, including those with multicore architectures. Readers will learn to avoid time-consuming and error-prone validation from the comprehensive coverage of system-level validation, including high-level modeling of designs and faults, automated generation of directed tests, and efficient validation methodology using directed tests and assertions. The methodologies described in this book will help designers to improve the quality of their validation, performing as much validation as possible in the early stages of the design, while reducing the overall validation effort and cost.

Dynamic Reconfiguration in Real-Time Systems - Energy, Performance, and Thermal Perspectives (Paperback, 2013 ed.): Weixun... Dynamic Reconfiguration in Real-Time Systems - Energy, Performance, and Thermal Perspectives (Paperback, 2013 ed.)
Weixun Wang, Prabhat Mishra, Sanjay Ranka
R4,154 Discovery Miles 41 540 Ships in 10 - 15 working days

Given the widespread use of real-time multitasking systems, there are tremendous optimization opportunities if reconfigurable computing can be effectively incorporated while maintaining performance and other design constraints of typical applications. The focus of this book is to describe the dynamic reconfiguration techniques that can be safely used in real-time systems. This book provides comprehensive approaches by considering synergistic effects of computation, communication as well as storage together to significantly improve overall performance, power, energy and temperature.

Dynamic Reconfiguration in Real-Time Systems - Energy, Performance, and Thermal Perspectives (Hardcover, 2012): Weixun Wang,... Dynamic Reconfiguration in Real-Time Systems - Energy, Performance, and Thermal Perspectives (Hardcover, 2012)
Weixun Wang, Prabhat Mishra, Sanjay Ranka
R3,891 Discovery Miles 38 910 Ships in 10 - 15 working days

Given the widespread use of real-time multitasking systems, there are tremendous optimization opportunities if reconfigurable computing can be effectively incorporated while maintaining performance and other design constraints of typical applications. The focus of this book is to describe the dynamic reconfiguration techniques that can be safely used in real-time systems. This book provides comprehensive approaches by considering synergistic effects of computation, communication as well as storage together to significantly improve overall performance, power, energy and temperature."

Contemporary Computing - Third International Conference, IC3 2010, Noida, India, August 9-11, 2010. Proceedings, Part I... Contemporary Computing - Third International Conference, IC3 2010, Noida, India, August 9-11, 2010. Proceedings, Part I (Paperback, Edition.)
Sanjay Ranka, Arunava Banerjee, Kanad Kishore Biswas, Sumeet Dua, Prabhat Mishra, …
R3,064 Discovery Miles 30 640 Ships in 10 - 15 working days

Welcome to the proceedings of the Third International Conference on Contemporary Computing, which was held in Noida (outskirts of New Delhi), India. Computing is an exciting and evolving area. This conference, which was jointly organized by the Jaypee Institute of Information Technology, Noida, India and the University of Fl- ida, Gainesville, USA, focused on topics that are of contemporary interest to computer and computational scientists and engineers. The conference had an exciting technical program of 79 papers submitted by - searchers and practitioners from academia, industry, and government to advance the algorithmic, systems, applications, and educational aspects of contemporary comp- ing. These papers were selected from 350 submissions (with an overall acceptance rate of around 23%). The technical program was put together by a distinguished int- national Program Committee consisting of more than 150 members. The Program Committee was led by the following Track Chairs: Arunava Banerjee, Kanad Kishore Biswas, Summet Dua, Prabhat Mishra, Rajat Moona, Sheung-Hung Poon, and Cho-Li Wang. I would like to thank the Program Committee and the Track Chairs for their tremendous effort. I would like to thank the General Chairs, Prof. Sartaj Sahni and Prof. Sanjay Goel, for giving me the opportunity to lead the technical program. Sanjay Ranka

Functional Verification of Programmable Embedded Architectures - A Top-Down Approach (Hardcover, 2005 ed.): Prabhat Mishra,... Functional Verification of Programmable Embedded Architectures - A Top-Down Approach (Hardcover, 2005 ed.)
Prabhat Mishra, Nikil D. Dutt
R3,077 Discovery Miles 30 770 Ships in 10 - 15 working days

It is widely acknowledged that the cost of validation and testing comprises a s- nificant percentage of the overall development costs for electronic systems today, and is expected to escalate sharply in the future. Many studies have shown that up to 70% of the design development time and resources are spent on functional verification. Functional errors manifest themselves very early in the design flow, and unless they are detected up front, they can result in severe consequence- both financially and from a safety viewpoint. Indeed, several recent instances of high-profile functional errors (e. g. , the Pentium FDIV bug) have resulted in - creased attention paid to verifying the functional correctness of designs. Recent efforts have proposed augmenting the traditional RTL simulation-based validation methodology with formal techniques in an attempt to uncover hard-to-find c- ner cases, with the goal of trying to reach RTL functional verification closure. However, what is often not highlighted is the fact that in spite of the tremendous time and effort put into such efforts at the RTL and lower levels of abstraction, the complexity of contemporary embedded systems makes it difficult to guarantee functional correctness at the system level under all possible operational scenarios. The problem is exacerbated in current System-on-Chip (SOC) design meth- ologies that employ Intellectual Property (IP) blocks composed of processor cores, coprocessors, and memory subsystems. Functional verification becomes one of the major bottlenecks in the design of such systems.

System-on-Chip Security - Validation and Verification (Paperback, 1st ed. 2020): Farimah Farahmandi, Yuanwen Huang, Prabhat... System-on-Chip Security - Validation and Verification (Paperback, 1st ed. 2020)
Farimah Farahmandi, Yuanwen Huang, Prabhat Mishra; Contributions by Fareena Saqib, Jim Plusquellic
R2,042 Discovery Miles 20 420 Ships in 12 - 17 working days

This book describes a wide variety of System-on-Chip (SoC) security threats and vulnerabilities, as well as their sources, in each stage of a design life cycle. The authors discuss a wide variety of state-of-the-art security verification and validation approaches such as formal methods and side-channel analysis, as well as simulation-based security and trust validation approaches. This book provides a comprehensive reference for system on chip designers and verification and validation engineers interested in verifying security and trust of heterogeneous SoCs.

Processor Description Languages, Volume 1 (Hardcover): Prabhat Mishra, Nikil Dutt Processor Description Languages, Volume 1 (Hardcover)
Prabhat Mishra, Nikil Dutt
R1,916 Discovery Miles 19 160 Ships in 12 - 17 working days

Efficient design of embedded processors plays a critical role in embedded systems design. Processor description languages and their associated specification, exploration and rapid prototyping methodologies are used to find the best possible design for a given set of applications under various design constraints, such as area, power and performance.
This book is the first, comprehensive survey of modern architecture description languages and will be an invaluable reference for embedded system architects, designers, developers, and validation engineers. Readers will see that the use of particular architecture description languages will lead to productivity gains in designing particular (application-specific) types of embedded processors.
* Comprehensive coverage of all modern architecture description languages... use the right ADL to design your processor to fit your application;
* Most up-to-date information available about each architecture description language from the developers...save time chasing down reliable documentation;
* Describes how each architecture desccription language enables key design automation tasks, such as simulation, synthesis and testing...fit the ADL to your design cycle;

Network-on-Chip Security and Privacy (Paperback, 1st ed. 2021): Prabhat Mishra, Subodha Charles Network-on-Chip Security and Privacy (Paperback, 1st ed. 2021)
Prabhat Mishra, Subodha Charles
R2,770 Discovery Miles 27 700 Ships in 10 - 15 working days

This book provides comprehensive coverage of Network-on-Chip (NoC) security vulnerabilities and state-of-the-art countermeasures, with contributions from System-on-Chip (SoC) designers, academic researchers and hardware security experts. Readers will gain a clear understanding of the existing security solutions for on-chip communication architectures and how they can be utilized effectively to design secure and trustworthy systems.

Micro-Economics Quick Handbook - Quick Handbook (Paperback): Prabhat Mishra Micro-Economics Quick Handbook - Quick Handbook (Paperback)
Prabhat Mishra
R222 Discovery Miles 2 220 Ships in 10 - 15 working days
System-Level Validation - High-Level Modeling and Directed Test Generation Techniques (Hardcover, 2013): Mingsong Chen, Xiaoke... System-Level Validation - High-Level Modeling and Directed Test Generation Techniques (Hardcover, 2013)
Mingsong Chen, Xiaoke Qin, Heon-Mo Koo, Prabhat Mishra
R3,991 Discovery Miles 39 910 Ships in 10 - 15 working days

This book covers state-of-the art techniques for high-level modeling and validation of complex hardware/software systems, including those with multicore architectures. Readers will learn to avoid time-consuming and error-prone validation from the comprehensive coverage of system-level validation, including high-level modeling of designs and faults, automated generation of directed tests, and efficient validation methodology using directed tests and assertions. The methodologies described in this book will help designers to improve the quality of their validation, performing as much validation as possible in the early stages of the design, while reducing the overall validation effort and cost.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Shield Anti-Freeze Summer Coolant 50…
 (4)
R57 Discovery Miles 570
Complete Clumping Cat Litter (10kg)
R137 Discovery Miles 1 370
White Glo Floss Mint
R43 Discovery Miles 430
Bitdefender Internet Security 2018 (4…
R359 Discovery Miles 3 590
Comfort Food From Your Slow Cooker - 100…
Sarah Flower Paperback R550 R455 Discovery Miles 4 550
Cable Guys Controller and Smartphone…
R355 Discovery Miles 3 550
Bosch GBM 320 Professional Drill…
R725 R609 Discovery Miles 6 090
Shield Air Conditioner Treatment Fogger…
R39 R35 Discovery Miles 350
Hart Easy Pour Kettle (2.5L)
 (2)
R199 R179 Discovery Miles 1 790
ShooAway Fly Repellent Fan (Black)
 (6)
R299 R259 Discovery Miles 2 590

 

Partners