Modeling and Simulation of Invasive Applications and Architectures كتب أخرى بهذه السلسلة

Implementation and Analysis of Ciphers in Quantum Computing Implementation and Analysis of Ciphers in Quantum Computing
٢٠٢٤
Emerging Computing: From Devices to Systems Emerging Computing: From Devices to Systems
٢٠٢٢
A Practical Guide for Simulation and FPGA Implementation of Digital Design A Practical Guide for Simulation and FPGA Implementation of Digital Design
٢٠٢٢
Classical and Physical Security of Symmetric Key Cryptographic Algorithms Classical and Physical Security of Symmetric Key Cryptographic Algorithms
٢٠٢٢
Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers
٢٠٢١
Lattice-Based Public-Key Cryptography in Hardware Lattice-Based Public-Key Cryptography in Hardware
٢٠١٩
Fully Homomorphic Encryption in Real World Applications Fully Homomorphic Encryption in Real World Applications
٢٠١٩
Domain Specific High-Level Synthesis for Cryptographic Workloads Domain Specific High-Level Synthesis for Cryptographic Workloads
٢٠١٩
Compact and Fast Machine Learning Accelerator for IoT Devices Compact and Fast Machine Learning Accelerator for IoT Devices
٢٠١٨
Fault Tolerant Architectures for Cryptography and Hardware Security Fault Tolerant Architectures for Cryptography and Hardware Security
٢٠١٨
Energy Efficient High Performance Processors Energy Efficient High Performance Processors
٢٠١٨
Invasive Computing for Mapping Parallel Programs to Many-Core Architectures Invasive Computing for Mapping Parallel Programs to Many-Core Architectures
٢٠١٧
High-level Estimation and Exploration of Reliability for Multi-Processor System-on-Chip High-level Estimation and Exploration of Reliability for Multi-Processor System-on-Chip
٢٠١٧
Invasive Tightly Coupled Processor Arrays Invasive Tightly Coupled Processor Arrays
٢٠١٦