Flylib.com
From ASICs to SOCs: A Practical Approach
From ASICs to SOCs: A Practical Approach
ISBN: 0130338575
EAN: 2147483647
Year: 2003
Pages: 61
Authors:
Farzad Nekoogar
,
Faranak Nekoogar
BUY ON AMAZON
COVER
TOC
Copyright
Prentice Hall Modern Semiconductor Design Series
About Prentice Hall Professional Technical Reference
List of Abbreviations
Preface
Acknowledgments
Chapter 1. Introduction
1.1 Introduction
1.2 Voice Over IP SOC
1.3 Intellectual Property
1.4 SOC Design Challenges
1.5 Design Methodology
1.6 Summary
1.7 References
Chapter 2. Overview of ASICs
2.1 Introduction
2.2 Methodology and Design Flow
2.3 FPGA to ASIC Conversion
2.4 Verification
2.5 Summary
2.6 References
Chapter 3. SOC Design and Verification
3.1 Introduction
3.2 Design for Integration
3.3 SOC Verification
3.4 Set-Top-Box SOC
3.5 Set-Top-Box SOC Example
3.6 Summary
3.7 References
Chapter 4. Physical Design
4.1 Introduction
4.2 Overview of Physical Design Flow
4.3 Some Tips and Guidelines for Physical Design
4.4 Modern Physical Design Techniques
4.5 Summary
4.6 References
Chapter 5. Low-Power Design
5.1 Introduction
5.2 Power Dissipation
5.3 Low-Power Design Techniques and Methodologies
5.4 Low-Power Design Tools
5.5 Tips and Guidelines for Low-Power Design
5.6 Summary
5.7 References
Appendix A. Low-Power Design Tools
PowerTheater
PowerTheater Analyst
PowerTheater Designer
Appendix B. Open Core Protocol (OCP)
Highlights
Capabilities
Advantages
Key Features
Appendix C. Phase-Locked Loops (PLLs)
PLL Basics
PLL Ideal Behavior
PLL Errors
Glossary
From ASICs to SOCs: A Practical Approach
ISBN: 0130338575
EAN: 2147483647
Year: 2003
Pages: 61
Authors:
Farzad Nekoogar
,
Faranak Nekoogar
BUY ON AMAZON
Project Management JumpStart
Assessing Risk
Developing the Project Plan
Executing the Project
Appendix A Answers to Review Questions
Appendix B Sample Project Management Forms
CISSP Exam Cram 2
Self-Assessment
Physical Security Risks
Intrusion-Detection Systems (IDS)
Computer System Architecture
Hack Attacks
The Complete Cisco VPN Configuration Guide
VPNs: Choosing a Solution
Concentrator Features
Cisco VPN Software Client
Viewing and Managing Connections
Troubleshooting PIX and ASA Connections
C++ How to Program (5th Edition)
Time Class Case Study: A Subtle TrapReturning a Reference to a private Data Member
Case Study: Payroll System Using Polymorphism and Run-Time Type Information with Downcasting, dynamic_cast, typeid and type_info
The Data Hierarchy
string Assignment and Concatenation
Appendix C. Fundamental Types
Cisco Voice Gateways and Gatekeepers
Review Questions
Case Study: Configuring PSTN Access
Review Questions
IP-to-IP Gateway Features
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
How case studies are used
Common principles of service-orientation
Service-Oriented Analysis (Part II: Service Modeling)
WSDL-related XML Schema language basics
WS-Coordination overview
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies