0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (4)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Optimal VLSI Architectural Synthesis - Area, Performance and Testability (Hardcover, 1992 ed.): Catherine H. Gebotys, Mohamed... Optimal VLSI Architectural Synthesis - Area, Performance and Testability (Hardcover, 1992 ed.)
Catherine H. Gebotys, Mohamed I. Elmasry
R4,324 Discovery Miles 43 240 Ships in 12 - 17 working days

Although research in architectural synthesis has been conducted for over ten years it has had very little impact on industry. This in our view is due to the inability of current architectural synthesizers to provide area-delay competitive (or "optimal") architectures, that will support interfaces to analog, asynchronous, and other complex processes. They also fail to incorporate testability. The OASIC (optimal architectural synthesis with interface constraints) architectural synthesizer and the CATREE (computer aided trees) synthesizer demonstrate how these problems can be solved. Traditionally architectural synthesis is viewed as NP hard and there fore most research has involved heuristics. OASIC demonstrates by using an IP approach (using polyhedral analysis), that most input algo rithms can be synthesized very fast into globally optimal architectures. Since a mathematical model is used, complex interface constraints can easily be incorporated and solved. Research in test incorporation has in general been separate from syn thesis research. This is due to the fact that traditional test research has been at the gate or lower level of design representation. Nevertheless as technologies scale down, and complexity of design scales up, the push for reducing testing times is increased. On way to deal with this is to incorporate test strategies early in the design process. The second half of this text examines an approach for integrating architectural synthesis with test incorporation. Research showed that test must be considered during synthesis to provide good architectural solutions which minimize Xlll area delay cost functions."

Security in Embedded Devices (Hardcover, 2010 ed.): Catherine H. Gebotys Security in Embedded Devices (Hardcover, 2010 ed.)
Catherine H. Gebotys
R4,612 R4,326 Discovery Miles 43 260 Save R286 (6%) Ships in 12 - 17 working days

Although security is prevalent in PCs, wireless communications and other systems today, it is expected to become increasingly important and widespread in many embedded devices. For some time, typical embedded system designers have been dealing with tremendous challenges in performance, power, price and reliability. However now they must additionally deal with definition of security requirements, security design and implementation. Given the limited number of security engineers in the market, large background of cryptography with which these standards are based upon, and difficulty of ensuring the implementation will also be secure from attacks, security design remains a challenge. This book provides the foundations for understanding embedded security design, outlining various aspects of security in devices ranging from typical wireless devices such as PDAs through to contactless smartcards to satellites.

Optimal VLSI Architectural Synthesis - Area, Performance and Testability (Paperback, Softcover reprint of the original 1st ed.... Optimal VLSI Architectural Synthesis - Area, Performance and Testability (Paperback, Softcover reprint of the original 1st ed. 1992)
Catherine H. Gebotys, Mohamed I. Elmasry
R4,232 Discovery Miles 42 320 Ships in 10 - 15 working days

Although research in architectural synthesis has been conducted for over ten years it has had very little impact on industry. This in our view is due to the inability of current architectural synthesizers to provide area-delay competitive (or "optimal") architectures, that will support interfaces to analog, asynchronous, and other complex processes. They also fail to incorporate testability. The OASIC (optimal architectural synthesis with interface constraints) architectural synthesizer and the CATREE (computer aided trees) synthesizer demonstrate how these problems can be solved. Traditionally architectural synthesis is viewed as NP hard and there fore most research has involved heuristics. OASIC demonstrates by using an IP approach (using polyhedral analysis), that most input algo rithms can be synthesized very fast into globally optimal architectures. Since a mathematical model is used, complex interface constraints can easily be incorporated and solved. Research in test incorporation has in general been separate from syn thesis research. This is due to the fact that traditional test research has been at the gate or lower level of design representation. Nevertheless as technologies scale down, and complexity of design scales up, the push for reducing testing times is increased. On way to deal with this is to incorporate test strategies early in the design process. The second half of this text examines an approach for integrating architectural synthesis with test incorporation. Research showed that test must be considered during synthesis to provide good architectural solutions which minimize Xlll area delay cost functions."

Security in Embedded Devices (Paperback, 2010 ed.): Catherine H. Gebotys Security in Embedded Devices (Paperback, 2010 ed.)
Catherine H. Gebotys
R3,033 Discovery Miles 30 330 Ships in 10 - 15 working days

Although security is prevalent in PCs, wireless communications and other systems today, it is expected to become increasingly important and widespread in many embedded devices. For some time, typical embedded system designers have been dealing with tremendous challenges in performance, power, price and reliability. However now they must additionally deal with definition of security requirements, security design and implementation. Given the limited number of security engineers in the market, large background of cryptography with which these standards are based upon, and difficulty of ensuring the implementation will also be secure from attacks, security design remains a challenge. This book provides the foundations for understanding embedded security design, outlining various aspects of security in devices ranging from typical wireless devices such as PDAs through to contactless smartcards to satellites.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Taurus Nixus Premium - Cordless Titanium…
 (1)
R873 Discovery Miles 8 730
Tenet
John David Washington, Robert Pattinson Blu-ray disc  (1)
R51 Discovery Miles 510
Fine Living Meta Office Chair (Black)
R599 R399 Discovery Miles 3 990
Playboy London Eau De Toilette (100ml…
R691 R473 Discovery Miles 4 730
Philips TAUE101 Wired In-Ear Headphones…
R199 R129 Discovery Miles 1 290
Vital BabyŽ HYGIENE™ Super Soft Hand…
R45 Discovery Miles 450
Dig & Discover: Ancient Egypt - Excavate…
Hinkler Pty Ltd Kit R256 R222 Discovery Miles 2 220
Elektra Health 8076 Electrode Hot Steam…
 (14)
R580 R474 Discovery Miles 4 740
Microsoft Xbox Series X Console (1TB)
 (21)
R14,999 Discovery Miles 149 990
How Did We Get Here? - A Girl's Guide to…
Mpoomy Ledwaba Paperback  (2)
R290 R195 Discovery Miles 1 950

 

Partners