Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
Invasive TCPAs provide unprecedented energy efficiency for the parallel execution of nested loop programs by avoiding any global memory access such as GPUs and may even support loops with complex dependencies such as loop-carried dependencies that are not amenable to parallel execution on GPUs.
This book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.e.
This book introduces a novel framework for accurately modeling the errors in nanoscale CMOS technology and developing a smooth tool flow at high-level design abstractions to estimate and mitigate the effects of errors.
This book provides an overview of and essential insights on invasive computing. The book provides extensive experimental evaluations, investigating the benefits of applying invasive computing and hybrid application mapping to give guarantees on non-functional properties such as timing, energy, and security.
This book presents the latest techniques for machine learning based data analytics on IoT edge devices. The authors also discuss hardware architecture design with coverage focusing on both CMOS based computing systems and the new emerging Resistive Random-Access Memory (RRAM) based systems.
It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum of fault models and practical fault injection techniques, ranging from simple, low-cost techniques to high-end equipment-based methods.
This book explores energy efficiency techniques for high-performance computing (HPC) systems using power-management methods. Adopting a step-by-step approach, it describes power-management flows, algorithms and mechanism that are employed in modern processors such as Intel Sandy Bridge, Haswell, Skylake and other architectures (e.g. ARM). Further, it includes practical examples and recent studies demonstrating how modem processors dynamically manage wide power ranges, from a few milliwatts in the lowest idle power state, to tens of watts in turbo state. Moreover, the book explains how thermal and power deliveries are managed in the context this huge power range. The book also discusses the different metrics for energy efficiency, presents several methods and applications of the power and energy estimation, and shows how by using innovative power estimation methods and new algorithms modern processors are able to optimize metrics such as power, energy, and performance. Different power estimation tools are presented, including tools that break down the power consumption of modern processors at sub-processor core/thread granularity. The book also investigates software, firmware and hardware coordination methods of reducing power consumption, for example a compiler-assisted power management method to overcome power excursions. Lastly, it examines firmware algorithms for dynamic cache resizing and dynamic voltage and frequency scaling (DVFS) for memory sub-systems.
This book explores the latest developments in fully homomorphic encryption (FHE), an effective means of performing arbitrary operations on encrypted data before storing it in the 'cloud'.
This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers.
This book presents the use of tweakable block ciphers for lightweight authenticated encryption, especially applications targeted toward hardware acceleration where such efficient schemes have demonstrated competitive performance and strong provable security with large margins.
This book consolidates several key aspects from the state-of-the-art research in symmetric key cryptography, which is among the cornerstones of digital security. The coverage of our book is quite diverse-it ranges from prerequisite information, latest research contribution as well as future research directions.
The book covers a range of topics dealing with emerging computing technologies which are being developed in response to challenges faced due to scaling CMOS technologies. It provides a sneak peek into the capabilities unleashed by these technologies across the complete system stack, with contributions by experts discussing device technology, circuit, architecture and design automation flows. Presenting a gradual progression of the individual sub-domains and the open research and adoption challenges, this book will be of interest to industry and academic researchers, technocrats and policymakers.Chapters "e;Innovative Memory Architectures Using Functionality Enhanced Devices"e; and "e;Intelligent Edge Biomedical Sensors in the Internet of Things (IoT) Era"e; are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
This book introduces the FPGA technology used in the laboratory sessions, and provides a step-by-step guide for designing and simulation of digital circuits. It utilizes the VHDL language, which is one of the most common language used to describe the design of digital systems. The Quartus II, Xilinx ISE 14.7 and ModelSim software are used to process the VHDL code and make simulations, and then the Altera and Xilinx FPGA platforms are employed to implement the simulated digital designs. The book is composed of four parts. The first part of this book has two chapters and covers various aspects: FPGA architectures, ASIC vs FPGA comparison, FPGA design flow and basic VHDL concepts necessary to describe the design of digital systems. The second part of the book includes three chapters that deal with the design of digital circuits such as combinational logic circuits, sequential logic circuits and finite state machines. The third part of the book is reserved for laboratory projects carried out on the FPGA platform. It is a largely hands-on lab class for design digital circuits and implementing their designs on the Altera FPGA platform. Finally, the fourth part of this work is devoted to recent applications carried out on FPGAs, in particular advanced techniques in renewable energy systems. The book is primarily intended for students, scholars, and industrial practitioners interested in the design of modern digital systems.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.