scispace - formally typeset
Search or ask a question
Conference

Asia and South Pacific Design Automation Conference 

About: Asia and South Pacific Design Automation Conference is an academic conference. The conference publishes majorly in the area(s): CMOS & Routing (electronic design automation). Over the lifetime, 4385 publications have been published by the conference receiving 61262 citations.


Papers
More filters
Proceedings ArticleDOI
F.M.H. Schuurmans1
07 Jan 2002
TL;DR: Digital watermarking, a technology for insertion of imperceptible information into multimedia content offers a solution for authentication and suitable action thereof, which is a rapidly maturing technology.
Abstract: Summary form only given. The ability to represent audio and video digitally and its vast popularity poses enormous challenges in protection against unauthorized use, copy and distribution in open, highly uncontrolled Internet environment. Digital watermarking, a technology for insertion of imperceptible information into multimedia content offers a solution for authentication and suitable action thereof. This is a rapidly maturing technology. Initiatives within the industry are ongoing for various forms of multimedia. Technology alone is unlikely to address all the copy protection issues. Business models and legal support also play an important role in tackling them.

611 citations

Proceedings ArticleDOI
21 Jan 2003
TL;DR: An algorithm which automatically maps the IPs/cores onto a generic regular Network on Chip (NoC) architecture such that the total communication energy is minimized and the performance of the mapped system is guaranteed to satisfy the specified constraints through bandwidth reservation.
Abstract: In this paper, we present an algorithm which automatically maps the IPs/cores onto a generic regular Network on Chip (NoC) architecture such that the total communication energy is minimized At the same time, the performance of the mapped system is guaranteed to satisfy the specified constraints through bandwidth reservation As the main contribution, we first formulate the problem of energy-aware mapping, in a topological sense, and then propose an efficient branch-and-bound algorithm to solve it Experimental results show that the proposed algorithm is very fast and robust, and significant energy savings can be achieved For instance, for a complex video/audio SoC design, on average, 604% energy savings have been observed compared to an ad-hoc implementation

585 citations

Proceedings ArticleDOI
07 Jan 2002
TL;DR: An introduction to this emerging area of battery modeling and battery-efficient system design is presented, promising technologies that have been developed are surveyed, and emerging industry standards for smart battery systems are outlined.
Abstract: As an increasing number of electronic systems are powered by batteries, battery life becomes a primary design consideration. Maxiimizing battery life requires system designers to develop an understanding of the capabilities and limitations of the batteries that power such systems, and to incorporate battery considerations into the system design process. Recent research has shown that, the amount of energy that can be supplied by a given battery varies significantly, depending on how the energy is drawn. Consequently, researchers are attempting to develop new battery-driven approaches to system design, which deliver battery life improvements over and beyond what can be achieved through conventional low-power design techniques. This paper presents an introduction to this emerging area, surveys promising technologies that have been developed for battery modeling and battery-efficient system design, and outlines emerging industry standards for smart battery systems.

388 citations

Proceedings ArticleDOI
Yen-Kuang Chen1
09 Mar 2012
TL;DR: An overview of challenges and opportunities presented by the M2M Internet, where hundreds of billions of smart sensors and devices will interact with one another without human intervention, on a Machine-to-Machine (M2M) basis, are provided.
Abstract: To date, most Internet applications focus on providing information, interaction, and entertainment for humans. However, with the widespread deployment of networked, intelligent sensor technologies, an Internet of Things (IoT) is steadily evolving, much like the Internet decades ago. In the future, hundreds of billions of smart sensors and devices will interact with one another without human intervention, on a Machine-to-Machine (M2M) basis. They will generate an enormous amount of data at an unprecedented scale and resolution, providing humans with information and control of events and objects even in remote physical environments. The scale of the M2M Internet will be several orders of magnitude larger than the existing Internet, posing serious research challenges. This paper will provide an overview of challenges and opportunities presented by this new paradigm.

270 citations

Proceedings ArticleDOI
10 Mar 2016
TL;DR: Both commercial and industrial IoT devices are used as examples from which the security of hardware, software, and networks are analyzed and backdoors are identified to help better understand the security vulnerabilities of existing IoT devices.
Abstract: The fast development of Internet of Things (IoT) and cyber-physical systems (CPS) has triggered a large demand of smart devices which are loaded with sensors collecting information from their surroundings, processing it and relaying it to remote locations for further analysis. The wide deployment of IoT devices and the pressure of time to market of device development have raised security and privacy concerns. In order to help better understand the security vulnerabilities of existing IoT devices and promote the development of low-cost IoT security methods, in this paper, we use both commercial and industrial IoT devices as examples from which the security of hardware, software, and networks are analyzed and backdoors are identified. A detailed security analysis procedure will be elaborated on a home automation system and a smart meter proving that security vulnerabilities are a common problem for most devices. Security solutions and mitigation methods will also be discussed to help IoT manufacturers secure their products.

231 citations

Performance
Metrics
No. of papers from the Conference in previous years
YearPapers
20232
202260
2021149
2020114
2019130
2018132