Conference
Asia and South Pacific Design Automation Conference
About: Asia and South Pacific Design Automation Conference is an academic conference. The conference publishes majorly in the area(s): CMOS & Routing (electronic design automation). Over the lifetime, 4385 publications have been published by the conference receiving 61262 citations.
Topics: CMOS, Routing (electronic design automation), Logic synthesis, Integrated circuit design, Logic gate
Papers published on a yearly basis
Papers
More filters
••
[...]
TL;DR: Digital watermarking, a technology for insertion of imperceptible information into multimedia content offers a solution for authentication and suitable action thereof, which is a rapidly maturing technology.
Abstract: Summary form only given. The ability to represent audio and video digitally and its vast popularity poses enormous challenges in protection against unauthorized use, copy and distribution in open, highly uncontrolled Internet environment. Digital watermarking, a technology for insertion of imperceptible information into multimedia content offers a solution for authentication and suitable action thereof. This is a rapidly maturing technology. Initiatives within the industry are ongoing for various forms of multimedia. Technology alone is unlikely to address all the copy protection issues. Business models and legal support also play an important role in tackling them.
611 citations
••
21 Jan 2003TL;DR: An algorithm which automatically maps the IPs/cores onto a generic regular Network on Chip (NoC) architecture such that the total communication energy is minimized and the performance of the mapped system is guaranteed to satisfy the specified constraints through bandwidth reservation.
Abstract: In this paper, we present an algorithm which automatically maps the IPs/cores onto a generic regular Network on Chip (NoC) architecture such that the total communication energy is minimized At the same time, the performance of the mapped system is guaranteed to satisfy the specified constraints through bandwidth reservation As the main contribution, we first formulate the problem of energy-aware mapping, in a topological sense, and then propose an efficient branch-and-bound algorithm to solve it Experimental results show that the proposed algorithm is very fast and robust, and significant energy savings can be achieved For instance, for a complex video/audio SoC design, on average, 604% energy savings have been observed compared to an ad-hoc implementation
585 citations
••
07 Jan 2002TL;DR: An introduction to this emerging area of battery modeling and battery-efficient system design is presented, promising technologies that have been developed are surveyed, and emerging industry standards for smart battery systems are outlined.
Abstract: As an increasing number of electronic systems are powered by batteries, battery life becomes a primary design consideration. Maxiimizing battery life requires system designers to develop an understanding of the capabilities and limitations of the batteries that power such systems, and to incorporate battery considerations into the system design process. Recent research has shown that, the amount of energy that can be supplied by a given battery varies significantly, depending on how the energy is drawn. Consequently, researchers are attempting to develop new battery-driven approaches to system design, which deliver battery life improvements over and beyond what can be achieved through conventional low-power design techniques. This paper presents an introduction to this emerging area, surveys promising technologies that have been developed for battery modeling and battery-efficient system design, and outlines emerging industry standards for smart battery systems.
388 citations
••
09 Mar 2012TL;DR: An overview of challenges and opportunities presented by the M2M Internet, where hundreds of billions of smart sensors and devices will interact with one another without human intervention, on a Machine-to-Machine (M2M) basis, are provided.
Abstract: To date, most Internet applications focus on providing information, interaction, and entertainment for humans. However, with the widespread deployment of networked, intelligent sensor technologies, an Internet of Things (IoT) is steadily evolving, much like the Internet decades ago. In the future, hundreds of billions of smart sensors and devices will interact with one another without human intervention, on a Machine-to-Machine (M2M) basis. They will generate an enormous amount of data at an unprecedented scale and resolution, providing humans with information and control of events and objects even in remote physical environments. The scale of the M2M Internet will be several orders of magnitude larger than the existing Internet, posing serious research challenges. This paper will provide an overview of challenges and opportunities presented by this new paradigm.
270 citations
••
10 Mar 2016TL;DR: Both commercial and industrial IoT devices are used as examples from which the security of hardware, software, and networks are analyzed and backdoors are identified to help better understand the security vulnerabilities of existing IoT devices.
Abstract: The fast development of Internet of Things (IoT) and cyber-physical systems (CPS) has triggered a large demand of smart devices which are loaded with sensors collecting information from their surroundings, processing it and relaying it to remote locations for further analysis. The wide deployment of IoT devices and the pressure of time to market of device development have raised security and privacy concerns. In order to help better understand the security vulnerabilities of existing IoT devices and promote the development of low-cost IoT security methods, in this paper, we use both commercial and industrial IoT devices as examples from which the security of hardware, software, and networks are analyzed and backdoors are identified. A detailed security analysis procedure will be elaborated on a home automation system and a smart meter proving that security vulnerabilities are a common problem for most devices. Security solutions and mitigation methods will also be discussed to help IoT manufacturers secure their products.
231 citations