Circuits and architectures have become more complex in terms of structure, interconnection topology, and data flow. Design correctness has become increasingly significant, as errors in design may result in strenuous debugging, or even in the repetition of a costly manufacturing process. Although circuit simulation has been used traditionally and widely as the technique for checking hardware and architectural designs, it does not guarantee the conformity of designs to specifications. Formal methods therefore become vital in guaranteeing the correctness of designs and have thus received a significant amount of attention in the CAD industry today.This book presents a formal method for specifying and verifying the correctness of systolic array designs. Such architectures are commonly found in the form of accelerators for digital signal, image, and video processing. These arrays can be quite complicated in topology and data flow. In the book, a formalism called STA is defined for these kinds of dynamic environments, with a survey of related techniques. A framework for specification and verification is established. Formal verification techniques to check the correctness of the systolic networks with respect to the algorithmic level specifications are explained. The book also presents a Prolog-based formal design verifier (named VSTA), developed to automate the verification process, as using a general purpose theorem prover is usually extremely time-consuming. Several application examples are included in the book to illustrate how formal techniques and the verifier can be used to automate proofs.
Presents a range of CAD algorithms and techniques for synthesizing and optimizing interconnect Provides insight & intuition into layout analysis and optimization for interconnect in high speed, high complexity integrated circuits
This book describes a communication paradigm that could shape the future of wireless communication networks, Opportunistic Spectrum Access (OSA) in Cognitive Radio Networks (CRN). While several theoretical OSA approaches have been proposed, they are challenged by the practical limitations of cognitive radios: the key enabling technology of OSA. This book presents an unprecedented formulation of the OSA problem in CNR that takes into account the practical limitations encountered due to existing technologies. Based on such a problem formulation, this book presents a framework and protocol details implementing the analytically-optimized solution of this problem. Unlike the state-of-the-art of CRN implementations that typically target software define radios which are not suitable for real systems, this book describes the implementation of distributed OSA, using practical radio transceiver technologies. It provides a thorough characterization of the gains available to theoretical OSA approaches if the practical limitations are taken into consideration. Tackles the cognitive radio networks performance optimization problem, taking into account the practical limitations of today’s technologies; Provides thorough performance evaluation in arbitrary, large-scale networks, as well as microscopic, small-scale performance evaluation, using realistic hardware implementation; Presents an empirical study of the gains available over existing techniques by adopting practical approaches; Tackles the cognitive radio networks performance optimization problem, taking into account the practical limitations of today’s technologies; Provides thorough performance evaluation in arbitrary, large-scale networks, as well as microscopic, small-scale performance evaluation, using realistic hardware implementation; Presents an empirical study of the gains available over existing techniques by adopting practical approaches;
This book provides a comprehensive treatment of security in the widely adopted, Radio Frequency Identification (RFID) technology. The authors present the fundamental principles of RFID cryptography in a manner accessible to a broad range of readers, enabling them to improve their RFID security design. This book also offers the reader a range of interesting topics portraying the current state-of-the-art in RFID technology and how it can be integrated with today’s Internet of Things (IoT) vision. The authors describe a first-of-its-kind, lightweight symmetric authenticated encryption cipher called Redundant Bit Security (RBS), which enables significant, multi-faceted performance improvements compared to existing cryptosystems. This book is a must-read for anyone aiming to overcome the constraints of practical implementation in RFID security technologies.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.