Spelling suggestions: "subject:"applicationspecific entegrated circuits"" "subject:"applicationspecific entegrated ircuits""
11 |
Methodology and design flow for metal programmable structured ASIC. / 金屬可編程的結構化專用集成電路之實現方法與設計流程 / Methodology and design flow for metal programmable structured application-specific integrated circuit / Jin shu ke bian cheng de jie gou hua zhuan yong ji cheng dian lu zhi shi xian fang fa yu she ji liu chengJanuary 2010 (has links)
Chau, Chun Pong. / "August 2010." / Thesis (M.Phil.)--Chinese University of Hong Kong, 2010. / Includes bibliographical references (leaves 67-71). / Abstracts in English and Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Motivation --- p.1 / Chapter 1.2 --- Objectives --- p.4 / Chapter 1.3 --- Contribution --- p.4 / Chapter 1.4 --- Thesis Organization --- p.5 / Chapter 2 --- Background and Review --- p.6 / Chapter 2.1 --- Introduction --- p.6 / Chapter 2.2 --- Logic Cell Style and Mask Programmability --- p.6 / Chapter 2.3 --- CAD Tools Compatibility --- p.8 / Chapter 2.4 --- Summary --- p.9 / Chapter 3 --- Architectural Design --- p.11 / Chapter 3.1 --- Overview --- p.11 / Chapter 3.2 --- Programmable Layers --- p.12 / Chapter 3.3 --- Combinational Logics --- p.12 / Chapter 3.4 --- Sequential Logics --- p.19 / Chapter 3.5 --- Inter-cell Connections --- p.21 / Chapter 3.6 --- Hard Macros --- p.22 / Chapter 3.7 --- Summary --- p.22 / Chapter 4 --- Design Flow --- p.23 / Chapter 4.1 --- Overview --- p.23 / Chapter 4.2 --- Library Creation --- p.24 / Chapter 4.3 --- Synthesis --- p.30 / Chapter 4.4 --- Placement and Routing --- p.30 / Chapter 4.5 --- Static Timing Analysis --- p.34 / Chapter 4.6 --- Summary --- p.35 / Chapter 5 --- Experimental Results --- p.36 / Chapter 5.1 --- Benchmark Circuits Description --- p.36 / Chapter 5.2 --- Experiment Settings --- p.37 / Chapter 5.3 --- Ratio of Dedicated Elements --- p.42 / Chapter 5.4 --- Delay and Area Comparison --- p.49 / Chapter 5.5 --- Distributed Memories --- p.53 / Chapter 5.6 --- Summary --- p.54 / Chapter 6 --- Prototypes and Applications --- p.55 / Chapter 6.1 --- Overview --- p.55 / Chapter 6.2 --- First Prototype --- p.55 / Chapter 6.3 --- Second Prototype --- p.63 / Chapter 7 --- Conclusion --- p.65 / Chapter 7.1 --- Future Work --- p.66 / Chapter 7.2 --- Concluding Remark --- p.67
|
12 |
Solutions for emerging problems in modular system-on-a-chip testingXu, Qiang. Nicolici, Nicola. January 2005 (has links)
Thesis (Ph.D.)--McMaster University, 2005. / Supervisor: Nicola Nicolici. Includes bibliographical references (189-208 p.)
|
13 |
ASIC design and implementation of a parallel exponentiation algorithm using optimized scalable Montgomery multipliersKurniawan, Budiyoso 14 March 2002 (has links)
Modular exponentiation and modular multiplication are the most used
operations in current cryptographic systems. Some well-known cryptographic
algorithms, such as RSA, Diffie-Hellman key exchange, and DSA, require modular
exponentiation operations. This is performed with a series of modular multiplications
to the extent of its exponent in a certain fashion depending on the exponentiation
algorithm used.
Cryptographic functions are very likely to be applied in current applications
that perform information exchange to secure, verify, or authenticate data. Most notable
is the use of such applications in Internet based information exchange. Smart cards,
hand-helds, cell phones and many other small devices also need to perform
information exchange and are likely to apply cryptographic functions.
A hardware solution to perform a cryptographic function is generally faster and
more secure than a software solution. Thus, a fast and area efficient modular
exponentiation hardware solution would provide a better infrastructure for current
cryptographic techniques.
In certain cryptographic algorithms, very large precisions are used. Further, the
precision may vary. Most of the hardware designs for modular multiplication and
modular exponentiation are fixed-precision solutions. A scalable Montgomery
Multiplier (MM) to perform modular multiplication has been proposed and can
operate on input values of any bit-size, but the maximum bit-size should be known and
is the limiting factor. The multiplier can calculate any operand size less than the
maximal precision. However, this design's parameters should be optimized depending
on the operand precision for which the design is used.
A software application was developed in C to find the optimized design for the
scalable MM module. It performs area-time trade-off for the most commonly used
precisions in order to obtain a fast and area efficient solution for the common case.
A modular exponentiation system is developed using this scalable multiplier
design. Since the multiplier can operate on any operand size up to a certain maximum
value, the exponentiation system that utilizes the multiplier will inherit the same
capability.
This thesis work presents the design and implementation of an exponentiation
algorithm in hardware utilizing the optimized scalable Montgomery Multiplier. The
design uses a parallel exponentiation algorithm to reduce the total computation time.
The modular exponentiation system experimental results are analyzed and
compared with software and other hardware implementations. / Graduation date: 2002
|
14 |
Establishment of a CMOS application specific integrated circuit database /George, Mathew Unknown Date (has links)
Thesis (M Eng) -- University of South Australia, 1992
|
15 |
Establishment of a CMOS application specific integrated circuit database /George, Mathew Unknown Date (has links)
Thesis (M Eng) -- University of South Australia, 1992
|
16 |
Talker detection for multimedia conferencing /Zhao, Han, January 1900 (has links)
Thesis (M.App.Sc.) - Carleton University, 2003. / Includes bibliographical references (p.94-97 ). Also available in electronic format on the Internet.
|
17 |
A multi-class, multi-dimensional classifier as a topology selector for analog circuit design / by Kyung-Im Son.Son, Kyung-Im. January 1998 (has links)
Thesis (Ph. D.)--University of Washington, 1998. / Includes bibliographical references (leaves [152]-159).
|
18 |
Architecture design methods for application domain-specific integrated computer systems /Soininen, Juha-Pekka. January 1900 (has links) (PDF)
Thesis (doctoral)--University of Oulu, 2004. / Includes bibliographical references. Also available on the World Wide Web.
|
19 |
Reducing digital test volume using test point insertionSethuram, Rajamani. January 2008 (has links)
Thesis (Ph. D.)--Rutgers University, 2008. / "Graduate Program in Electrical and Computer Engineering." Includes bibliographical references (p. 101-106).
|
20 |
An ASIC application for DNA sequencing by Smith-Waterman algorithm (DNASSWA) /Lin, Cheng-Hsien Kenny. January 2004 (has links) (PDF)
Thesis (M.Phil.) - University of Queensland, 2005. / Includes bibliography.
|
Page generated in 0.1146 seconds