The software and hardware development fields evolved along separate paths through the end of the 20th century. We seem to have come full circle, however. The previously rigid hardware on which our programs run is softening in many ways. Embedded systems are largely responsible for this softening. These hidden computing systems drive the electronic products around us, including consumer products like digital cameras and personal digital assistants, office automation equipment like copy machines and printers, medical devices like heart monitors and ventilators, and automotive electronics like cruise controls and antilock brakes. Embedded systems force designers to work under incredibly tight time-tomarket, power consumption, size, performance, flexibility, and cost constraints. many technologies introduced over the past two decades have sought to help satisfy these constraints. To understand these technologies, it is important to first distinguish the underlying embedded systems elements.
标签: development the software hardware
上传时间: 2017-08-15
上传用户:cjf0304
This book is an essential for digital design,written by professor walkerely.It has been a reference for many generations of developers
标签: essential professor walkerely reference
上传时间: 2017-08-15
上传用户:lps11188
These documents are all classic documents relating to the domain of virus writing.Give a good insight about the virus which are rare and are considered best for case studies..many variants are still being produced and all these are original.Its very hard to find them now adays..these are extremely helpfull for people working in Malware analysis and malicious code analysis
标签: documents relating classic writing
上传时间: 2017-08-18
上传用户:thuyenvinh
The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribution attempts to provide a state-of-the-art description of this topic. First, the advantages of reconfigurable hardware for cryptographic applications are discussed from a systems perspective. Second, potential security problems of FPGAs are described in detail, followed by a proposal of a some countermeasure. Third, a list of open research problems is provided. Even though there have been many contributions dealing with the algorithmic aspects of cryptographic schemes implemented on FPGAs, this contribution appears to be the first comprehensive treatment of system and security aspects.
标签: cryptographic applications attractive for
上传时间: 2013-12-07
上传用户:zhuimenghuadie
The Fortran 90 Handbook is a definitive and comprehensive guide to Fortran 90 and its use. Fortran 90, the latest standard version of Fortran, has many excellent new features that will assist the programmer in writing efficient, portable, and maintainable programs. The Fortran 90 Handbook is an informal description of Fortran 90, developed to provide not only a readable explanation of features, but also some rationale for the inclusion of features and their use. In addition, “models” give the reader better insight as to why things are done as they are in the language.
标签: Fortran comprehensive definitive and
上传时间: 2014-01-14
上传用户:huannan88
Pattern Analysis is the process of fi nding general relations in a set of data, and forms the core of many disciplines, from neural networks to so-called syn- tactical pattern recognition, from statistical pattern recognition to machine learning and data mining. Applications of pattern analysis range from bioin- formatics to document retrieval.
标签: the relations Analysis Pattern
上传时间: 2017-09-07
上传用户:SimonQQ
VideoMan (Video Manager) is an open-source C++ library that helps you developing video based applications. We created VideoMan to increase our productivity developing computer vision applications, but it can be used in many other ways. With VideoMan is very easy and fast to initialize any kind of video input like webcams, video files, frame grabbers, IEEE 1394 cameras and so on. You can initialize multiple inputs at the same time and show them in the screen. Also, you can show the results of the processing steps of your computer vision algorithm (extracted edges, back projections, detected blobs...) This way you can see the results of what are you coding, checking the results of your algorithm steps. Moreover, the implemented visualization scheme make easier to combine computer graphics with video, for example to show a 3d model on top of video for augmented reality applications.
标签: open-source developing VideoMan Manager
上传时间: 2014-01-21
上传用户:chongcongying
These are precompiled demonstration programs of the Onix toolkit. They do not include the Onix toolkit but are examples of very simple applications written with the toolkit. They are designed to show both how Onix works and also to show how easy it is to integrate the Onix toolkit into a project. While they show many of the features of the Onix toolkit, they don t show all of them. Please consult our documentation, available at our website, to see many of the features Onix gives you. We have included online the full documentation for the Onix toolkit.
标签: Onix demonstration precompiled the
上传时间: 2014-11-26
上传用户:xinzhch
Aodv for NS-2. A mobile ad-hoc network (MANET) is a kind of wireless ad-hoc network, and is a self-configuring network of mobile routers connected wirelessly. MANET may operate in a standalone fashion, or may be connected to the larger Internet. many routing protocols have been developed for MANETs over the past few years. This project evaluated three specific MANET routing protocols which are Ad-hoc On-demand Distance Vector (AODV), Dynamic Source Routing (DSR) and Dynamic MANET Ondemand routing protocol (DYMO) to better understand the major characteristics of these routing protocols. Different performance aspects were investigated in this project including packet delivery ratio, routing overhead, throughput and average end-to-end delay.
标签: network ad-hoc wireless mobile
上传时间: 2014-01-12
上传用户:zsjzc
Among the many features built into Microchip’sEnhanced FLASH Microcontroller devices is the capability of the program memory to self-program. This very useful feature has been deliberately included to give the user the ability to perform bootloading operations.Devices like the PIC18F452 are designed with a designated“boot block”, a small section of protectable program memory allocated specifically for bootload firmware.
上传时间: 2015-03-05
上传用户:rfvrfv