Hardware-oriented method antyaliayzynhu stepper trajectory segments
نویسندگان
چکیده
منابع مشابه
Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives
Linear diffusion layer is an important part of lightweight block ciphers and hash functions. This paper presents an efficient class of lightweight 4x4 MDS matrices such that the implementation cost of them and their corresponding inverses are equal. The main target of the paper is hardware oriented cryptographic primitives and the implementation cost is measured in terms of the required number ...
متن کاملHardware Modelling and Simulation Using an Object-Oriented Method
In order to reduce the cost, the time-to-market and to make the most pertinent choices, it becomes essential to allow designers to evaluate, very soon in the design phase, a given application performances with respect to the targetted architecture. So, we have decided to build a modelling and simulation environnement in order to evaluate digital hardware architecture performances. We considered...
متن کاملHardware Architecture Modelling Using an Object-Oriented Method
The very high integration rate and the increasing complexity of digital hardware architectures and embedded applications lead designers to search for new tools and methods. In order to reduce the time-to-market it becomes essential to allow designers to evaluate performances of a given application with the targetted architecture very soon in the design phase. So we have decided to build a model...
متن کاملObject Oriented Hardware Design
This paper describes a plan to integrate current digital hardware design technology into the computer science hardware curriculum. The project will approach digital hardware design from a perspective familiar to computer science students. Techniques featuring Object Oriented Design (OOD), Object Oriented Programming (OOP), code reuse, rapid prototyping, project centered learning, and visualizat...
متن کاملReceiver Oriented Trajectory Based Forwarding
Trajectory Based Forwarding (TBF) is a new approach to routing in ad hoc wireless networks. It exploits node position information and, similarly to source routing, requires the source node to encode a trajectory into the packet header. The routing process does not require to specify forwarding nodes. As a matter of fact, forwarding nodes are dynamically selected while packets cross the network ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Problems of Informatization and Management
سال: 2008
ISSN: 2073-4751
DOI: 10.18372/2073-4751.1.9287