Flylib.com
From ASICs to SOCs: A Practical Approach
From ASICs to SOCs: A Practical Approach
ISBN: 0130338575
EAN: 2147483647
Year: 2003
Pages: 61
Authors:
Farzad Nekoogar
,
Faranak Nekoogar
BUY ON AMAZON
COVER
TOC
Copyright
Prentice Hall Modern Semiconductor Design Series
About Prentice Hall Professional Technical Reference
List of Abbreviations
Preface
Acknowledgments
Chapter 1. Introduction
1.1 Introduction
1.2 Voice Over IP SOC
1.3 Intellectual Property
1.4 SOC Design Challenges
1.5 Design Methodology
1.6 Summary
1.7 References
Chapter 2. Overview of ASICs
2.1 Introduction
2.2 Methodology and Design Flow
2.3 FPGA to ASIC Conversion
2.4 Verification
2.5 Summary
2.6 References
Chapter 3. SOC Design and Verification
3.1 Introduction
3.2 Design for Integration
3.3 SOC Verification
3.4 Set-Top-Box SOC
3.5 Set-Top-Box SOC Example
3.6 Summary
3.7 References
Chapter 4. Physical Design
4.1 Introduction
4.2 Overview of Physical Design Flow
4.3 Some Tips and Guidelines for Physical Design
4.4 Modern Physical Design Techniques
4.5 Summary
4.6 References
Chapter 5. Low-Power Design
5.1 Introduction
5.2 Power Dissipation
5.3 Low-Power Design Techniques and Methodologies
5.4 Low-Power Design Tools
5.5 Tips and Guidelines for Low-Power Design
5.6 Summary
5.7 References
Appendix A. Low-Power Design Tools
PowerTheater
PowerTheater Analyst
PowerTheater Designer
Appendix B. Open Core Protocol (OCP)
Highlights
Capabilities
Advantages
Key Features
Appendix C. Phase-Locked Loops (PLLs)
PLL Basics
PLL Ideal Behavior
PLL Errors
Glossary
From ASICs to SOCs: A Practical Approach
ISBN: 0130338575
EAN: 2147483647
Year: 2003
Pages: 61
Authors:
Farzad Nekoogar
,
Faranak Nekoogar
BUY ON AMAZON
Cisco IP Communications Express: CallManager Express with Cisco Unity Express
The Purpose of Cisco IPC Express
The Cisco 7920 Wireless IP Phone
Basic Calls Between Cisco CallManager and Cisco CME
TCL-Based Automated Attendant
Table vm_message
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
IDS and IPS Architecture
NFR Security
Laws, Standards, and Organizations
Security Business Issues
The Future of Intrusion Detection and Prevention
Microsoft WSH and VBScript Programming for the Absolute Beginner
Getting Started with the WSH and VBScript
Constants, Variables, and Arrays
Using Procedures to Organize Scripts
Combining Different Scripting Languages
Appendix A WSH Administrative Scripting
Special Edition Using FileMaker 8
Understanding the Role of Keys in Database Design
Creating Cross-Product Relationships
Formatting Exported Data
Deploying to Handheld Devices
Using Third-Party Documentation Tools
MPLS Configuration on Cisco IOS Software
MPLS Control and Data Plane Components
Outbound Route Filters
EIGRP PE-CE Routing Protocol Overview, Configuration, and Verification
VPLS Overview
VPLS Topology-Single PE or Direct Attachment
GDI+ Programming with C#
Working with Bitmaps
Image Attributes and the ImageAttributes Class
Transformation
Miscellaneous GDI+ Examples
Section A.2. Understanding the try...catch Block
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies