• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » książki  » Computer Architecture and Design Methodologies

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946600]
• Literatura piękna
 [1856966]

  więcej...
• Turystyka
 [72221]
• Informatyka
 [151456]
• Komiksy
 [35826]
• Encyklopedie
 [23190]
• Dziecięca
 [619653]
• Hobby
 [140543]
• AudioBooki
 [1577]
• Literatura faktu
 [228355]
• Muzyka CD
 [410]
• Słowniki
 [2874]
• Inne
 [445822]
• Kalendarze
 [1744]
• Podręczniki
 [167141]
• Poradniki
 [482898]
• Religia
 [510455]
• Czasopisma
 [526]
• Sport
 [61590]
• Sztuka
 [243598]
• CD, DVD, Video
 [3423]
• Technologie
 [219201]
• Zdrowie
 [101638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2473]
• Puzzle, gry
 [3898]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8170]
Kategorie szczegółowe BISAC
 
High-Level Estimation and Exploration of Reliability for Multi-Processor System-On-Chip

Zheng Wang; Anupam Chattopadhyay
This book introduces a novel framework for accurately modeling the errors in nanoscale CMOS technology and developing a smooth tool flow at high-level design abstractions to estimate and mitigate the effects of errors.
This book introduces a novel framework for accurately modeling the errors in nanoscale CMOS technology and developing a smooth tool flow at high-level...
cena: 403,47 zł
 
Domain Specific High-Level Synthesis for Cryptographic Workloads

Ayesha Khalid; Goutam Paul; Anupam Chattopadhyay

This book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.e. symmetric key cryptography. With the aid of detailed case studies, it also discusses optimization strategies that cannot be automatically undertaken by CRYKET (Cryptographic kernels toolkit. The dynamic nature of cryptography, where newer cryptographic functions and attacks frequently surface, means that such a tool can help cryptographers expedite the very large scale integration (VLSI) design cycle by rapidly exploring...


This book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptogr...

cena: 403,47 zł
 
Invasive Tightly Coupled Processor Arrays

Vahid Lari
This book introduces new massively parallel computer (MPSoC) architectures called invasive tightly coupled processor arrays. It proposes strategies, architecture designs, and programming interfaces for invasive TCPAs that allow invading and subsequently executing loop programs with strict requirements or guarantees of non-functional execution qualities such as performance, power consumption, and reliability. For the first time, such a configurable processor array architecture consisting of locally interconnected VLIW processing elements can be claimed by programs, either in full or in part,...
This book introduces new massively parallel computer (MPSoC) architectures called invasive tightly coupled processor arrays. It proposes strategies, a...
cena: 403,47 zł
 
Fault Tolerant Architectures for Cryptography and Hardware Security

Sikhar Patranabis; Debdeep Mukhopadhyay
It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum of fault models and practical fault injection techniques, ranging from simple, low-cost techniques to high-end equipment-based methods.
It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum...
cena: 564,88 zł
 
Invasive Computing for Mapping Parallel Programs to Many-Core Architectures

Andreas Weichslgartner; Stefan Wildermann; Michael Glab
This book provides an overview of and essential insights on invasive computing. The book provides extensive experimental evaluations, investigating the benefits of applying invasive computing and hybrid application mapping to give guarantees on non-functional properties such as timing, energy, and security.
This book provides an overview of and essential insights on invasive computing. The book provides extensive experimental evaluations, investigating th...
cena: 403,47 zł
 
Energy Efficient High Performance Processors: Recent Approaches for Designing Green High Performance Computing

Jawad Haj-Yahya; Avi Mendelson; Yosi Ben Asher
cena: 484,18 zł
 
Invasive Tightly Coupled Processor Arrays

Vahid Lari
cena: 403,47 zł
 
High-Level Estimation and Exploration of Reliability for Multi-Processor System-On-Chip

Zheng Wang; Anupam Chattopadhyay
cena: 403,47 zł
 
Compact and Fast Machine Learning Accelerator for Iot Devices

Hantao Huang; Hao Yu
cena: 524,53 zł
 
Invasive Computing for Mapping Parallel Programs to Many-Core Architectures

Andreas Weichslgartner; Stefan Wildermann; Michael Glaß
cena: 403,47 zł
ilość książek w kategorii: 22
 1  2  3  Następna Ostatnia


Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia