نتایج جستجو برای: netlist encryption

تعداد نتایج: 27942  

Journal: :journal of advances in computer research 0
fereshteh ghanbari adivi m.sc. computer systems architecture, dezfoul branch, islamic azad university, dezfoul, iran mohammad mehrnia m.sc. computer systems architecture, dezfoul branch, islamic azad university, dezfoul, iran

this paper presents a new audio encryption algorithm based on permutation and residue number system. in the current approach, signal samples are combined with residue number system through permutation; therefore, a specific noise is generated. then, the audio signal is combined with the noise, generated by the algorithm, to produce a silence signal. for this purpose, the algorithm uses a predef...

Journal: :تحقیقات بازاریابی نوین 0
abdolghader pourali

mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. a mobile payment system should be beneficial for all related persons. for a payment system to be a successful system, end-user, seller, exporter and operators should see a additional value in it. end-user pr...

2004
Alan Mishchenko

An important part of the design flow, technology mapping, expresses logic functions of the netlist using gates from the technology library, in the presence of various design constraints. This paper proposes a new approach to technology mapping, which relies on several known techniques, combined and tuned to work in a new way. The previous work on DAG mapping is extended, by proposing new method...

1996
C. M Fiduccia

Table 2. Comparison of bisection solution quality, using unit module areas. each run consists of 1000 passes of FM. LSMC outperforms the previous best reported results in the literature by 6.4 for unit area and averages 21.4 improvement o ver FMx50. With actual module areas, LSMC is 1 better than previous results, and averages 36 improvement o ver FMx50. We h a ve presented an experimental stud...

Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...

Journal: :Symmetry 2023

Layout stitching is a repetitive and tedious task of the radio frequency integrated circuit (RFIC) design process. While academic research on layout splicing algorithms mainly focuses analog digital circuits, there still lack well-developed for RFICs. An RFIC system usually has symmetrical layout, such as transmitter receiver components, low-noise amplifier (LNA), an SPDT switch, etc. This pape...

2002
Olivier Coudert

A physical design flow consists of producing a productionworthy layout from a gate-level netlist subject to a set of constraints. This paper focuses on the problems imposed by shrinking process technologies. It exposes the problems of timing closure, signal integrity, design variable dependencies, clock and power/ground routing, and design signoff. It also surveys some physical design flows, an...

1993
L. Hagen F. P. Preparata M. I. Shamos D. G. Schweikert B. W. Kernighan

We have introduced fast and eeective k-way partitioning solutions for the two regimes k n and k = (n). Our contributions include a new \partitioning-speciic" net model used in constructing the Laplacian of the netlist, the use of fast Lanczos implementations to compute the d-dimensional geometric embedding eeciently, and a careful choice of geometric clustering objectives and algorithms. We bel...

2007
Anatol Ursu

A method for inferring latches from combinational loops in a netlist using boolean equations is proposed in this paper. The method takes advantage of the solutions structure of the latch loop boolean equation that allows us to obtain a phase and permutation independent procedure for latch inference. This method allows a better latch matching in equivalence checking tools.

Journal: :Preview 2019

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید