You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book is about security in embedded systems and it provides an authoritative reference to all aspects of security in system-on-chip (SoC) designs. The authors discuss issues ranging from security requirements in SoC designs, definition of architectures and design choices to enforce and validate security policies, and trade-offs and conflicts involving security, functionality, and debug requirements. Coverage also includes case studies from the “trenches” of current industrial practice in design, implementation, and validation of security-critical embedded systems. Provides an authoritative reference and summary of the current state-of-the-art in security for embedded systems, hardware IPs and SoC designs; Takes a "cross-cutting" view of security that interacts with different design and validation components such as architecture, implementation, verification, and debug, each enforcing unique trade-offs; Includes high-level overview, detailed analysis on implementation, and relevant case studies on design/verification/debug issues related to IP/SoC security.
This book constitutes the refereed proceedings of the 6th International Workshop on Distributed Computing, IWDC 2004, held in Kolkata, India in December 2004. The 27 revised full papers and 27 revised short papers presented together with 3 invited contributions and abstracts of 11 reviewed workshop papers were carefully reviewed and selected from 157 submissions. The papers are organized in topical sections on distributed algorithms, high-performance computing, distributed systems, wireless networks, information security, network protocols, reliability and testing, network topology and routing, mobile computing, ad-hoc networks, and sensor networks.
This volume contains a collection of research articles on multivariate statistical methods, encompassing both theoretical advances and emerging applications in a variety of scientific disciplines. It serves as a tribute to Professor S N Roy, an eminent statistician who has made seminal contributions to the area of multivariate statistical methods, on his birth centenary. In the area of emerging applications, the topics include bioinformatics, categorical data and clinical trials, econometrics, longitudinal data analysis, microarray data analysis, sample surveys, statistical process control, etc. Researchers, professionals and advanced graduates will find the book an essential resource for modern developments in theory as well as for innovative and emerging important applications in the area of multivariate statistical methods.
This book constitutes the refereed proceedings of the 16th International Symposium on VSLI Design and Test, VDAT 2012, held in Shibpur, India, in July 2012. The 30 revised regular papers presented together with 10 short papers and 13 poster sessions were carefully selected from 135 submissions. The papers are organized in topical sections on VLSI design, design and modeling of digital circuits and systems, testing and verification, design for testability, testing memories and regular logic arrays, embedded systems: hardware/software co-design and verification, emerging technology: nanoscale computing and nanotechnology.
The physical design flow of any project depends upon the size of the design, the technology, the number of designers, the clock frequency, and the time to do the design. As technology advances and design-styles change, physical design flows are constantly reinvented as traditional phases are removed and new ones are added to accommodate changes in technology. Handbook of Algorithms for Physical Design Automation provides a detailed overview of VLSI physical design automation, emphasizing state-of-the-art techniques, trends and improvements that have emerged during the previous decade. After a brief introduction to the modern physical design problem, basic algorithmic techniques, and partitio...
This book presents a collection of invited articles by distinguished Mathematicians on the occasion of the Platinum Jubilee Celebrations of the Indian Statistical Institute, during the year 2007. These articles provide a current perspective of different areas of research, emphasizing the major challenging issues. Given the very significant record of the Institute in research in the areas of Statistics, Probability and Mathematics, distinguished authors have very admirably responded to the invitation. Some of the articles are written keeping students and potential new entrants to an area of mathematics in mind. This volume is thus very unique and gives a perspective of several important aspects of mathematics.
This book constitutes the thoroughly refereed post-proceedings of the 16th International Workshop on Languages and Compilers for Parallel Computing, LCPC 2003, held in College Station, Texas, USA, in October 2003. The 35 revised full papers presented were selected from 48 submissions during two rounds of reviewing and improvement upon presentation at the workshop. The papers are organized in topical sections on adaptive optimization, data locality, parallel languages, high-level transformations, embedded systems, distributed systems software, low-level transformations, compiling for novel architectures, and optimization infrastructure.
The refereed proceedings of the 11th Annual International Computing and Combinatorics Conference, COCOON 2005, held in Kunming, China in August 2005. The 96 revised full papers presented together with abstracts of 3 invited talks were carefully reviewed and selected from 353 submissions. The papers cover most aspects of theoretical computer science and combinatorics related to computing and are organized in topical sections on bioinformatics, networks, string algorithms, scheduling, complexity, steiner trees, graph drawing and layout design, quantum computing, randomized algorithms, geometry, codes, finance, facility location, graph theory, graph algorithms.
This volume contains articles written by leading researchers in the fields of algorithms, architectures, and information systems security. The first five chapters address several challenging geometric problems and related algorithms. These topics have major applications in pattern recognition, image analysis, digital geometry, surface reconstruction, computer vision and in robotics. The next five chapters focus on various optimization issues in VLSI design and test architectures, and in wireless networks. The last six chapters comprise scholarly articles on information systems security covering privacy issues, access control, enterprise and network security, and digital image forensics.