نتایج جستجو برای: microprocessors
تعداد نتایج: 3632 فیلتر نتایج به سال:
Micro-processor designs have become a revolutionary technology almost in every industry. They brought the reality of automation and also electronic gadgets. While trying to improvise these hardware modules handle heavy computational loads, they substantially reached limit size, power efficiency, similar avenues. Due constraints, many manufacturers corporate entities are ways optimize mini beast...
Hardware Trojan Horses (HTHs) represent today a serious issue not only for academy but also industry because of the dramatic complexity and dangerousness attackers can count on. It has been shown that HTHs be inserted in modern complex microprocessors allowing attacker to run malicious software, acquire root privileges steal secret user information. In this paper we propose DETON, an automatic ...
A minimalistic set of multimedia instructions introduced into PA-RISC microprocessors implements SIMD-MIMD parallelism with insignificant changes to the underlying microprocessor. Thus, a software video decoder attains MPEG video and audio decompression and playback at real-time rates of 30 frames per second, on an entry-level workstation. Our general-purpose parallel subword hxstructions can a...
The precise exception model [1] views an exception as Although a large number of asynchronous microprocessors have now been designed, relatively few have attempted to handle memory faults. Memory faults create problems for the design of any pipelined system which are exacerbated by the non-deterministic nature of an asyn-
ACL2 is a mechanized mathematical logic intended for use in specifying and proving properties of computing machines. In two independent projects, industrial engineers have collaborated with researchers at Computational Logic, Inc. (CLI), to use ACL2 to model and prove properties of state-of-the-art commercial microprocessors prior to fabrication. In the rst project, Motorola, Inc., and CLI coll...
As the complexity of high-performance microprocessor increases, functional verification becomes more difficult and emerges as the bottleneck of the design cycle. In this paper, we suggest a functional verification methodology, especially for the compatible microprocessor design. To guarantee the perfect compatibility with previous microprocessors, we developed three C models in different repres...
The Security Architecture for Microprocessors (SAM ) is a lightweight and high-performance combined hardand software security extension for microprocessors. SAM has been designed to provide a secure remote code execution environment. It can be used to implement effective copy-protection schemes and provides mechanisms to prevent data and algorithm disclosure. SAM provides protection even if an ...
Traditional Computer Science curriculum focuses on the training for logic reasoning and programming skills. System integration are often not covered in most computer science curricula. As the embedded platforms migrate from 8-bit microprocessors to 32-bit microprocessors, the engineers require different skills to design modern embedded systems. The Computer Science faculty at several universiti...
The technical, business, and market requirements for large enterprise servers (“mainframes”) strongly influence the design of microprocessors for these systems. Specific characteristics of the ESA/390 and z/Architecture instruction set architectures lead to different pipeline and branch prediction strategies than are found in most other microprocessors. The requirements for robust, scalable per...
This paper reports two senior-level design projects in electronic and computer engineering study programs. The projects involve the design, development and construction of model robots using embedded controllers and microprocessors. The teaching technique not only motivates the students to develop a thorough understanding of the embedded controllers and microprocessors, but also helps them in t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید