Flylib.com
From ASICs to SOCs: A Practical Approach
From ASICs to SOCs: A Practical Approach
ISBN: 0130338575
EAN: 2147483647
Year: 2003
Pages: 61
Authors:
Farzad Nekoogar
,
Faranak Nekoogar
BUY ON AMAZON
COVER
TOC
Copyright
Prentice Hall Modern Semiconductor Design Series
About Prentice Hall Professional Technical Reference
List of Abbreviations
Preface
Acknowledgments
Chapter 1. Introduction
1.1 Introduction
1.2 Voice Over IP SOC
1.3 Intellectual Property
1.4 SOC Design Challenges
1.5 Design Methodology
1.6 Summary
1.7 References
Chapter 2. Overview of ASICs
2.1 Introduction
2.2 Methodology and Design Flow
2.3 FPGA to ASIC Conversion
2.4 Verification
2.5 Summary
2.6 References
Chapter 3. SOC Design and Verification
3.1 Introduction
3.2 Design for Integration
3.3 SOC Verification
3.4 Set-Top-Box SOC
3.5 Set-Top-Box SOC Example
3.6 Summary
3.7 References
Chapter 4. Physical Design
4.1 Introduction
4.2 Overview of Physical Design Flow
4.3 Some Tips and Guidelines for Physical Design
4.4 Modern Physical Design Techniques
4.5 Summary
4.6 References
Chapter 5. Low-Power Design
5.1 Introduction
5.2 Power Dissipation
5.3 Low-Power Design Techniques and Methodologies
5.4 Low-Power Design Tools
5.5 Tips and Guidelines for Low-Power Design
5.6 Summary
5.7 References
Appendix A. Low-Power Design Tools
PowerTheater
PowerTheater Analyst
PowerTheater Designer
Appendix B. Open Core Protocol (OCP)
Highlights
Capabilities
Advantages
Key Features
Appendix C. Phase-Locked Loops (PLLs)
PLL Basics
PLL Ideal Behavior
PLL Errors
Glossary
From ASICs to SOCs: A Practical Approach
ISBN: 0130338575
EAN: 2147483647
Year: 2003
Pages: 61
Authors:
Farzad Nekoogar
,
Faranak Nekoogar
BUY ON AMAZON
Absolute Beginner[ap]s Guide to Project Management
The Goal of the Schedule Development Process
Performance Reporting
"Managing Project Deliverables" Means What Exactly?
Where Is Leadership Needed on a Project?
Three Key Principles
Inside Network Security Assessment: Guarding Your IT Infrastructure
Four Ways in Which You Can Respond to Risk
The Role Authentication, Authorization, and Accountability Play in a Secure Organization
Security and the Employee (Social Engineering)
Level I Assessments
Building the Final Report
Cisco IP Communications Express: CallManager Express with Cisco Unity Express
Using Cisco IPC Express in Retail, Financial, and Healthcare Businesses
The Cisco 7940G and 7960G IP Phones
Erasing the Phone Configuration
PSTN Call Switching
Appendix A. Cisco IPC Express Features, Releases, and Ordering Information
Building Web Applications with UML (2nd Edition)
HTTP
JavaScript Objects
Overview of Software Development
Artifacts of the UX Model
Analysis Model Classes
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 28. Scan Passively with KisMAC
Hack 42. Secure Your Linux Network with WPA
Hack 46. Proxy Web Traffic over SSH
Hack 56. Send Power over Your Ethernet
Hack 58. Upgrade the Linksys WET11
Java All-In-One Desk Reference For Dummies
Understanding Object-Oriented Programming
Working with Statics
Using Arrays
Choosing from a List
Working with XML
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies