We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 395 results
  1. Interconnect Architectures for 3D Technologies

    In this chapter, we discuss the basics of interconnect architectures for 2D and 3D SoCs. The trend toward more components in a SoC requires an...
    Lennart Bamberg, Jan Moritz Joseph, ... Thilo Pionteck in 3D Interconnect Architectures for Heterogeneous Technologies
    Chapter 2022
  2. Preliminaries

    This chapter provides background information on relevant and common topics for this book. First, it introduces SystemC basics and its TLM...
    Muhammad Hassan, Daniel Große, Rolf Drechsler in Enhanced Virtual Prototyping for Heterogeneous Systems
    Chapter 2023
  3. A Power Efficient Heterogeneous Embedded Vision System

    A heterogeneous Image acquisition and processing system is presented based on commercially available components. Due to the addition of a field...

    Roelof van Silfhout in Journal of Signal Processing Systems
    Article 20 July 2023
  4. Design and Analysis of Imaging Chip using High-Speed AXI-Interface for MPSOC Applications on FPGA Platform

    The recent innovations in real-time video and image enhancements are allowing much advancement in a wide range of diverse applications. These...

    H. R. Archana, C. R. Byra Reddy in Wireless Personal Communications
    Article 01 March 2024
  5. Virtual Prototyping of Processor-Based Platforms

    Virtual Prototypes of processor-based SoCs are widely used by semiconductor and system companies in many application domains like mobile...
    Living reference work entry 2022
  6. Platform-Based Design of Embedded Neuromorphic Systems

    Neuromorphic systems are integrated circuits designed to mimic the event-driven computations in a mammalian brain. These systems enable the execution...
    Chapter 2024
  7. Transaction-Level Power Modeling Methodology

    In this chapter, Transaction-Level Power Modeling (TLPM) methodology is proposed for dynamic power estimation using TLM. The TLPM methodology is...
    Amr Baher Darwish, Magdy Ali El-Moursy, Mohamed Amin Dessouky in Transaction-Level Power Modeling
    Chapter 2020
  8. Digital Early Security Validation

    This chapter discusses novel security validation approaches to ensure high quality secure Virtual Prototypes (VPs) using static and dynamic...
    Muhammad Hassan, Daniel Große, Rolf Drechsler in Enhanced Virtual Prototyping for Heterogeneous Systems
    Chapter 2023
  9. The Blocks Framework

    For any computer architecture to be widely adopted it is required that good tool support is available. For a typical processor this usually consists...
    Chapter 2022
  10. Embedded Platform Architectures

    We have studied the current processor architectures and the direction in which they are advancing for higher performance. Data crunching needs are...
    Chapter 2022
  11. Microarchitectural Vulnerabilities Introduced, Exploited, and Accelerated by Heterogeneous FPGA-CPU Platforms

    After years of development, FPGAs finally made an appearance on multi-tenant cloud servers in the late 2010s. Research in micro-architectural attacks...
    Thore Tiemann, Zane Weissman, ... Berk Sunar in Security of FPGA-Accelerated Cloud Computing Environments
    Chapter 2024
  12. Runtime SoC Security Validation

    With the ever-increasing size and complexity of System-on-Chip (SoC) architectures, where numerous parties (either trusted or untrusted) are involved...
    Mark Tehranipoor, Kimia Zamiri Azar, ... Farimah Farahmandi in Hardware Security
    Chapter 2024
  13. Detecting Distributed Denial of Service (DDoS) in MANET Using Ad Hoc On-Demand Distance Vector (AODV) with Extra Tree Classifier (ETC)

    This paper concentrate on an option for mitigating distributed denial of service (DDoS) attacks that can stern consequences in mobile ad hoc network...

    Article 11 December 2023
  14. Hardware and Environment Modeling

    This chapter explores the role of RISC-V in the Internet of Things (IoT) era, emphasizing its popularity due to its open and free instruction set...
    Chapter 2024
  15. Secure Video Streaming Using Dedicated Hardware

    The purpose of this article is to present a system that enhances the security, efficiency, and reconfigurability of an Internet-of-Things (IoT)...

    Nicholas Murray-Hill, Laura Fontes, ... Isibor Kennedy Ihianle in Journal of Signal Processing Systems
    Article Open access 15 August 2023
  16. Hardware/Software Co-Design for Traffic Sign Inference on Edge Using PYNQ

    Traffic sign classification is the real-time safety-critical task in driver assistance systems and self-driving vehicles which is realized via the...
    Conference paper 2024
  17. Pre-Silicon Verification and Post-Silicon Validation Methodologies

    The testing can be divided into two categories Pre-Silicon verification and post-Silicon validation. Pre-Silicon verification deals with simulating...
    Chapter 2024
  18. CMOS-compatible electrochemical synaptic transistor arrays for deep learning accelerators

    In-memory computing architectures based on memristive crossbar arrays could offer higher computing efficiency than traditional hardware in deep...

    Jinsong Cui, Fufei An, ... Qing Cao in Nature Electronics
    Article 27 March 2023
  19. CAD for Hardware/Software Security Verification

    Security validation and verification have become challenging due to the complexity of the modern system-on-chip (SoC) design. Existing verification...
    Farimah Farahmandi, M. Sazadur Rahman, ... Mark Tehranipoor in CAD for Hardware Security
    Chapter 2023
  20. Hintergrund

    Dieses Kapitel zielt darauf ab, dieses Buch in sich geschlossen zu halten, indem es kurze Einführungen in die grundlegenden Konzepte bietet, die für...
    Chapter 2023
Did you find what you were looking for? Share feedback.