Electronic Design Automation for IC System Design, Verification, and Testing


Book Description

The first of two volumes in the Electronic Design Automation for Integrated Circuits Handbook, Second Edition, Electronic Design Automation for IC System Design, Verification, and Testing thoroughly examines system-level design, microarchitectural design, logic verification, and testing. Chapters contributed by leading experts authoritatively discuss processor modeling and design tools, using performance metrics to select microprocessor cores for integrated circuit (IC) designs, design and verification languages, digital simulation, hardware acceleration and emulation, and much more. New to This Edition: Major updates appearing in the initial phases of the design flow, where the level of abstraction keeps rising to support more functionality with lower non-recurring engineering (NRE) costs Significant revisions reflected in the final phases of the design flow, where the complexity due to smaller and smaller geometries is compounded by the slow progress of shorter wavelength lithography New coverage of cutting-edge applications and approaches realized in the decade since publication of the previous edition—these are illustrated by new chapters on high-level synthesis, system-on-chip (SoC) block-based design, and back-annotating system-level models Offering improved depth and modernity, Electronic Design Automation for IC System Design, Verification, and Testing provides a valuable, state-of-the-art reference for electronic design automation (EDA) students, researchers, and professionals.




The NSA Report


Book Description

The official report that has shaped the international debate about NSA surveillance "We cannot discount the risk, in light of the lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking. Americans must never make the mistake of wholly 'trusting' our public officials."—The NSA Report This is the official report that is helping shape the international debate about the unprecedented surveillance activities of the National Security Agency. Commissioned by President Obama following disclosures by former NSA contractor Edward J. Snowden, and written by a preeminent group of intelligence and legal experts, the report examines the extent of NSA programs and calls for dozens of urgent and practical reforms. The result is a blueprint showing how the government can reaffirm its commitment to privacy and civil liberties—without compromising national security.




ASIC/SoC Functional Design Verification


Book Description

This book describes in detail all required technologies and methodologies needed to create a comprehensive, functional design verification strategy and environment to tackle the toughest job of guaranteeing first-pass working silicon. The author first outlines all of the verification sub-fields at a high level, with just enough depth to allow an engineer to grasp the field before delving into its detail. He then describes in detail industry standard technologies such as UVM (Universal Verification Methodology), SVA (SystemVerilog Assertions), SFC (SystemVerilog Functional Coverage), CDV (Coverage Driven Verification), Low Power Verification (Unified Power Format UPF), AMS (Analog Mixed Signal) verification, Virtual Platform TLM2.0/ESL (Electronic System Level) methodology, Static Formal Verification, Logic Equivalency Check (LEC), Hardware Acceleration, Hardware Emulation, Hardware/Software Co-verification, Power Performance Area (PPA) analysis on a virtual platform, Reuse Methodology from Algorithm/ESL to RTL, and other overall methodologies.




Ecology, Conservation, and Restoration of Chilika Lagoon, India


Book Description

This book chronicles the decades-long work of studying, analyzing, and reversing the environmental pressures that threatened India’s Chilika Lagoon, the largest brackish-water lagoon in the region, and the second largest in the world. Designated as one of India’s first Ramsar Sites in 1981, Chilika Lagoon continued to degrade for a decade longer. Then, the Chilika Development Authority (CDA) was established to gather information and devise a restoration plan that benefits the ecosystems of the lagoon, with sensitivity to the needs and livelihoods of local communities. Expert contributors detail the work of analysis, planning and implementation, including extensive coverage of such topics as: Devising a plan for implementing Ramsar wise use guidelines Sedimentologic, chemical, and isotopic impacts Hydrodynamics and salinity Runoff and sediment in watersheds of the Lagoon's Western Catchment Long-term analysis of water quality and continued water quality monitoring Bio-optical models for cyclone impact assessment Studies of geomorphology, land use, and sedimentary environments Spatiotemporal assessment of phytoplankton communities Creation of a post-restoration scenario for fish and fisheries Assessing status of waterbirds, species diversity and migration patterns The result was a major hydrological intervention to re-establish hydrological and salinity regimes, biodiversity, and fish catches, and help protect the livelihood of lagoon-dependent communities. The story of the rehabilitation and management of Chilika Lagoon demonstrates that it is possible to halt and reverse the encroachment and degradation of wetlands, to restore biodiversity and to provide benefits for large numbers of people. Ecology, Conservation, and Restoration of Chilika Lagoon goes beyond scientific research articles to explore institutional and governance issues, political ecology, and the Ramsar Convention’s guidelines for ecosystem restoration. The book will benefit researchers, wetland managers, government policy makers and more general readers concerned with restoration and conservation of wetlands around the planet.







Frankenstein


Book Description

Frankenstein is a novel by Mary Shelley. It was first published in 1818. Ever since its publication, the story of Frankenstein has remained brightly in the imagination of the readers and literary circles across the countries. In the novel, an English explorer in the Arctic, who assists Victor Frankenstein on the final leg of his chase, tells the story. As a talented young medical student, Frankenstein strikes upon the secret of endowing life to the dead. He becomes obsessed with the idea that he might make a man. The Outcome is a miserable and an outcast who seeks murderous revenge for his condition. Frankenstein pursues him when the creature flees. It is at this juncture t that Frankenstein meets the explorer and recounts his story, dying soon after. Although it has been adapted into films numerous times, they failed to effectively convey the stark horror and philosophical vision of the novel. Shelley's novel is a combination of Gothic horror story and science fiction.







The Future of Foreign Intelligence


Book Description

Since the Revolutionary War, America's military and political leaders have recognized that U.S. national security depends upon the collection of intelligence. Absent information about foreign threats, the thinking went, the country and its citizens stood in great peril. To address this, the Courts and Congress have historically given the President broad leeway to obtain foreign intelligence. But in order to find information about an individual in the United States, the executive branch had to demonstrate that the person was an agent of a foreign power. Today, that barrier no longer exists. The intelligence community now collects massive amounts of data and then looks for potential threats to the United States. As renowned national security law scholar Laura K. Donohue explains in The Future of Foreign Intelligence, global communications systems and digital technologies have changed our lives in countless ways. But they have also contributed to a worrying transformation. Together with statutory alterations instituted in the wake of 9/11, and secret legal interpretations that have only recently become public, new and emerging technologies have radically expanded the amount and type of information that the government collects about U.S. citizens. Traditionally, for national security, the Courts have allowed weaker Fourth Amendment standards for search and seizure than those that mark criminal law. Information that is being collected for foreign intelligence purposes, though, is now being used for criminal prosecution. The expansion in the government's acquisition of private information, and the convergence between national security and criminal law threaten individual liberty. Donohue traces the evolution of U.S. foreign intelligence law and pairs it with the progress of Fourth Amendment jurisprudence. She argues that the bulk collection programs instituted by the National Security Agency amount to a general warrant, the prevention of which was the reason the Founders introduced the Fourth Amendment. The expansion of foreign intelligence surveillanceleant momentum by advances in technology, the Global War on Terror, and the emphasis on securing the homelandnow threatens to consume protections essential to privacy, which is a necessary component of a healthy democracy. Donohue offers a road map for reining in the national security state's expansive reach, arguing for a judicial re-evaluation of third party doctrine and statutory reform that will force the executive branch to take privacy seriously, even as Congress provides for the collection of intelligence central to U.S. national security. Alarming and penetrating, this is essential reading for anyone interested in the future of foreign intelligence and privacy in the United States.




Dictionary of Computer Terms


Book Description