From the Publisher: The Verilog Programming Language Interface is a powerful feature of the Verilog standard. Through this interface, a Verilog simulator can be customized to perform virtually any engineering task des...
ISBN:
(纸本)9780792376583;0792376587
From the Publisher: The Verilog Programming Language Interface is a powerful feature of the Verilog standard. Through this interface, a Verilog simulator can be customized to perform virtually any engineering task desired, such as adding custom design debug utilities, adding proprietary file read/write utilities, and interfacing bus functional C language models to a simulator. This book serves as both a user's guide for learning the Verilog PLI, and as a comprehensive reference manual on the Verilog PLI standard. Both the TF/ACC ("PLI 1.0") and the VPI ("PLI 2.0") generations of the PLI are presented, based on the IEEE 1364 Verilog standard. The second edition of this book adds detailed coverage of the many enhancements added in the latest IEEE 1364-2001 Verilog standard ("Verilog-2001"). A CD is included, with the C source code, Verilog HDL test cases and simulation result logs for more than 75 complete PLI examples.
At present, the expansion of tetherless communications is a technological trend surpassed perhaps only by the explosive growth of the Internet. Wireless systems are being deployed today mainly for telephony, satisfyin...
详细信息
ISBN:
(纸本)9780792386803;9780306473272
At present, the expansion of tetherless communications is a technological trend surpassed perhaps only by the explosive growth of the Internet. Wireless systems are being deployed today mainly for telephony, satisfying the ind- trialized nations''appetite for talk-on-the-go, and providing much-needed communications infrastructure in developing countries. The desire for wi- less access to the Internet is starting to add fuel to the growth of tetherless communications. Indeed, the synergy of wireless and Internet technologies will lead to a host of exciting new applications, some of which are not yet envisioned. Future-generation wireless systems will achieve capacities much higher than the systems of today by incorporating myriad improvements. These in- vations include transmission in higher-frequency bands, “smart antennas”, multi-user detection, new forward error-correction techniques, and advanced network resource-allocation techniques. The term “smart antenna” usually refers to the deployment of multiple antennas at the base-station site, coupled with special processing of the m- tiple received signals. Smart antennas can adaptively reject co-channel int- ference and mitigate multipath fading, and have been identified by many as a promising means to extend base-station coverage, increase system capacity and enhance quality of service.
From the Publisher: Research and development of logic synthesis and verification have matured considerably over the past two decades. Many commercial products are available, and they have been critical in harnessing a...
ISBN:
(纸本)0792376064;9780792376064
From the Publisher: Research and development of logic synthesis and verification have matured considerably over the past two decades. Many commercial products are available, and they have been critical in harnessing advances in fabrication technology to produce today's plethora of electronic components. While this maturity is assuring, the advances in fabrication continue to seemingly present unwieldy challenges. Logic Synthesis and Verification provides a state-of-the-art view of logic synthesis and verification. It consists of fifteen chapters, each focusing on a distinct aspect. Each chapter presents key developments, outlines future challenges, and lists essential references. Two unique features of this book are technical strength and comprehensiveness. The book chapters are written by twenty-eight recognized leaders in the field and reviewed by equally qualified experts. The topics collectively span the field. Logic Synthesis and Verification fills a current gap in the existing CAD literature. Each chapter contains essential information to study a topic at a great depth, and to understand further developments in the field. The book is intended for seniors, graduate students, researchers, and developers of related computer-Aided Design (CAD) tools.
From the Publisher: "This text is an excellent reference for both professional and academic researchers in the field of VLSI using residue number systems. It is also of interest to those working in the general fi...
ISBN:
(纸本)1402070314
From the Publisher: "This text is an excellent reference for both professional and academic researchers in the field of VLSI using residue number systems. It is also of interest to those working in the general fields of VLSI design, DSP design, and cryptography." Residue Number Systems: Algorithms and Architectures is also suitable for a graduate-level course as part of a VLSI curriculum.
From the Publisher: Informed Watermarking is an essential tool for both academic and professional researchers working in the areas of multimedia security, information embedding, and communication. Theory and practice ...
详细信息
ISBN:
(纸本)9781402070716
From the Publisher: Informed Watermarking is an essential tool for both academic and professional researchers working in the areas of multimedia security, information embedding, and communication. Theory and practice are linked, particularly in the area of multi-user communication.
The book presents a self-contained overview of the state of the art in the complexity of lattice problems, with particular emphasis on problems that are related to the construction of cryptographic functions. Specific...
详细信息
ISBN:
(纸本)9780792376880
The book presents a self-contained overview of the state of the art in the complexity of lattice problems, with particular emphasis on problems that are related to the construction of cryptographic functions. Specific topics covered are the strongest known inapproximability result for the shortest vector problem; the relations between this and other computational lattice problems; an exposition of how cryptographic functions can be built and prove secure based on worst-case hardness assumptions about lattice problems; and a study of the limits of non-approximability of lattice problems. Some background in complexity theory, but no prior knowledge about lattices, is assumed.
This book is based on my doctoral thesis at the Helsinki University of Technology. Several different projects during five years guided me from the basics of the RF IC design to the implementations of highly integrated...
详细信息
ISBN:
(数字)9780306475450
ISBN:
(纸本)0792376072
This book is based on my doctoral thesis at the Helsinki University of Technology. Several different projects during five years guided me from the basics of the RF IC design to the implementations of highly integrated radio receiver chips. Sharing time and effort between IC and system issues is not always straightforward. I have been lucky to follow both topics and share experiences with diligent and enthusiastic people having different specialities. As a result, this book will cover a wide range of different topics needed in the design of highly integrated radio receivers. Experiences from the first receiver prototypes for the third generation cellular systems form the basis of this book. Most of the issues are directly related to the early proposals of European and Japanese standardization organizations. For example, the chip rate was originally set to 4. 096 Mcps in a wide-band CDMA channel. I have kept that number in the book in most of the examples although it has been later changed to 3. 84 Mcps. I hope that the readers will accept that and the possible other incompabilities to the latest specifications. At least in the research phase the changes even in the most essential requirements are definitely not a rare incident and IC designers should be able to react and modify their designs as soon as they can.
暂无评论