Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Hardware Security (3)
- ASIC (2)
- FPGA (2)
- Hardware security (2)
- Information Theory (2)
-
- Internet of Things (2)
- Machine Learning (2)
- Memristor (2)
- Neural network (2)
- Obfuscation (2)
- Physically Unclonable Functions (2)
- Reliability (2)
- SRAM (2)
- #KRKTR (1)
- 3D Architecture (1)
- 3D Circuits (1)
- 3D IC (1)
- 3D Memory (1)
- AI (1)
- ASL (1)
- Accessibility (1)
- Action learning (1)
- Action research (1)
- Agency (1)
- Allies (1)
- American Sign Language (1)
- Analog Computing (1)
- Analog Signal Processing (1)
- Anthropology (1)
- Apache (1)
Articles 31 - 35 of 35
Full-Text Articles in Computer Engineering
Managing And Leveraging Variations And Noise In Nanometer Cmos, Vikram B. Suresh
Managing And Leveraging Variations And Noise In Nanometer Cmos, Vikram B. Suresh
Doctoral Dissertations
Advanced CMOS technologies have enabled high density designs at the cost of complex fabrication process. Variation in oxide thickness and Random Dopant Fluctuation (RDF) lead to variation in transistor threshold voltage Vth. Current photo-lithography process used for printing decreasing critical dimensions result in variation in transistor channel length and width. A related challenge in nanometer CMOS is that of on-chip random noise. With decreasing threshold voltage and operating voltage; and increasing operating temperature, CMOS devices are more sensitive to random on-chip noise in advanced technologies. In this thesis, we explore novel circuit techniques to manage the impact of …
Asymptotic Analysis Of Random Wireless Networks: Broadcasting, Secrecy, And Hybrid Networks, Cagatay Capar
Asymptotic Analysis Of Random Wireless Networks: Broadcasting, Secrecy, And Hybrid Networks, Cagatay Capar
Doctoral Dissertations
This thesis work is concerned with communication in large random wireless ad hoc networks. We mathematically model the wireless network as a collection of randomly located nodes, and explore how its performance scales as the network size increases. In particular, we study three important properties: broadcasting ability, rate of information exchange, and secret communication capability. In addition, we study connectivity properties of large random graphs in a more general context, where the graph does not necessarily represent a wireless communication network. Broadcasting, i.e., delivering a message from a single node to the entire network in a wireless ad hoc network …
Interpreting, Stephanie Jo Kent
Interpreting, Stephanie Jo Kent
Doctoral Dissertations
What do community interpreting for the Deaf in western societies, conference interpreting for the European Parliament, and language brokering in international management have in common? Academic research and professional training have historically emphasized the linguistic and cognitive challenges of interpreting, neglecting or ignoring the social aspects that structure communication. All forms of interpreting are inherently social; they involve relationships among at least three people and two languages. The contexts explored here, American Sign Language/English interpreting and spoken language interpreting within the European Parliament, show that simultaneous interpreting involves attitudes, norms and values about intercultural communication that overemphasize information and discount …
Parallel Multi-Core Verilog Hdl Simulation, Tariq B. Ahmad
Parallel Multi-Core Verilog Hdl Simulation, Tariq B. Ahmad
Doctoral Dissertations
In the era of multi-core computing, the push for creating true parallel applications that can run on individual CPUs is on the rise. Application of parallel discrete event simulation (PDES) to hardware design verification looks promising, given the complexity of today’s hardware designs. Unfortunately, the challenges imposed by lack of inherent parallelism, suboptimal design partitioning, synchronization and communication overhead, and load balancing, render this approach largely ineffective. This thesis presents three techniques for accelerating simulation at three levels of abstraction namely, RTL, functional gate-level (zero-delay) and gate-level timing. We review contemporary solutions and then propose new ways of speeding up …
Exploiting Energy Harvesting For Passive Embedded Computing Systems, Jeremy Joel Gummeson
Exploiting Energy Harvesting For Passive Embedded Computing Systems, Jeremy Joel Gummeson
Doctoral Dissertations
The key limitation in mobile computing systems is energy - without a stable power supply, these systems cannot process, store, or communicate data. This problem is of particular interest since the storage density of battery technologies do not follow scaling trends similar to Moore's law. This means that depending on application performance requirements and lifetime objectives, a battery may dominate the overall system weight and form factor; this could result in an overall size that is either inconvenient or unacceptable for a particular application. As device features have scaled down in size, entire embedded systems have been implemented on a …