The dataflow model of computation differs from the traditional control-flow
model of computation in that it does not utilize a program counter to sequence
instructions in a program. Instead, the execution of instructions is based solely on the
availability of their operands. Thus, an instruction is executed in a dataflow...
A Hybrid Meshnet LAN, a new local area network architecture, has been proposed by Dr. Cheoul-Shin Kang and Dr. James Herzog. It provides for distributed control hybrid architecture which is good for effective load sharing under various local area network environments. Hybrid Meshnet has a dual channel structure, a token...
With advancements in CMOS technology, high speed analog circuits that were
traditionally implemented with discrete circuit components can now be made monolithically.
Antialiasing filters for video signals as well as signal conditioning filters in high
speed communication channels are examples of applications where high frequency integrated
circuits are now feasible....
A public key cryptosystem allows two or more parties to securely communicate
over an insecure channel without establishing a physically secure channel for key
exchange. The RSA cryptosystem is the most popular public key cryptosystem ever
invented. It is based on the difficulty of factoring large composite numbers. Once the...
Due to advances in high-density low-cost VLSI and communication technology,
digital filtering and signal processing are being widely used for real-time signal processing
applications. Given the filter specification, choosing the best filter structure for a given
application is not a trivial task. The choice of a particular filter structure depends...
Modular multiplication is a mathematical operation fundamental to the RSA cryptosystern,
a public-key cryptosystem with many applications in privacy, security, and authenticity.
However, cryptosecurity requires that the numbers involved be extremely large,
typically ranging from 512-1024 bits in length. Calculations on numbers of this magnitude
are cumbersome and lengthy; this...
Delta-sigma modulators are currently a very popular technique for making high-resolution
analog-to-digital and digital-to-analog converters. These oversampled data
converters have several advantages over conventional Nyquist-rate converters, including
an insensitivity to many analog component imperfections, a simpler antialiasing filter and
reduced accuracy requirements in the sample and hold. Though the initial...
Delta-sigma data converters have gained popularity in both analog-to-digital and digital-to-analog converters (ADCs and DACs) due to their simplicity, high linearity and immunity to many analog circuit imperfections. These data converters include features such as oversampling, noise-shaping, and (historically) single-bit quantization. Single-bit converters are preferred for their inherent linearity. This...
As the performance gap between processor and memory grows, memory latency will be a major bottleneck in achieving high processor utilization. Multithreading has emerged as one of the most promising and exciting techniques used to tolerate memory latency by exploiting thread-level parallelism. The question however remains as to how effective...
The major limiting factor of DRAM access time is the low transconductance of the
MOSFET's which have only limited current drive capability. The bipolar junction
transistor(BJT) has a collector current amplification factor, β, times base current and is
limited mostly by the willingness to supply this base current. This collector...
With edge rates of high speed digital devices pushing into the sub-nano second
range, interconnections with the associated packages play a major role in determining
the speed, size and performance of digital circuits and systems. The purpose of this
study is to develop experimental techniques based on time domain peeling...