Search Results for Computer hardware. - Narrowed by: Processor Architectures. - Systems engineering.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dComputer$002bhardware.$0026qf$003dSUBJECT$002509Konu$002509Processor$002bArchitectures.$002509Processor$002bArchitectures.$0026qf$003dSUBJECT$002509Konu$002509Systems$002bengineering.$002509Systems$002bengineering.$0026ps$003d300?2024-07-31T07:26:13ZHardware Security and Trust Design and Deployment of Integrated Circuits in a Threatened Environmentent://SD_ILS/0/SD_ILS:2235252024-07-31T07:26:13Z2024-07-31T07:26:13ZYazar Sklavos, Nicolas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44318-8">https://doi.org/10.1007/978-3-319-44318-8</a><br/>Format: Electronic Resources<br/>Foundations of Hardware IP Protectionent://SD_ILS/0/SD_ILS:2263762024-07-31T07:26:13Z2024-07-31T07:26:13ZYazar Bossuet, Lilian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50380-6">https://doi.org/10.1007/978-3-319-50380-6</a><br/>Format: Electronic Resources<br/>Handbook of Hardware/Software Codesignent://SD_ILS/0/SD_ILS:2243402024-07-31T07:26:13Z2024-07-31T07:26:13ZYazar Ha, Soonhoi. editor.<br/><a href="https://doi.org/10.1007/978-94-017-7267-9">https://doi.org/10.1007/978-94-017-7267-9</a><br/>Format: Electronic Resources<br/>Trusted Digital Circuits Hardware Trojan Vulnerabilities, Prevention and Detectionent://SD_ILS/0/SD_ILS:2230222024-07-31T07:26:13Z2024-07-31T07:26:13ZYazar Salmani, Hassan. author.<br/><a href="https://doi.org/10.1007/978-3-319-79081-7">https://doi.org/10.1007/978-3-319-79081-7</a><br/>Format: Electronic Resources<br/>Hardware Protection through Obfuscationent://SD_ILS/0/SD_ILS:2236982024-07-31T07:26:13Z2024-07-31T07:26:13ZYazar Forte, Domenic. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49019-9">https://doi.org/10.1007/978-3-319-49019-9</a><br/>Format: Electronic Resources<br/>Physically Unclonable Functions From Basic Design Principles to Advanced Hardware Security Applicationsent://SD_ILS/0/SD_ILS:2230412024-07-31T07:26:13Z2024-07-31T07:26:13ZYazar Halak, Basel. author.<br/><a href="https://doi.org/10.1007/978-3-319-76804-5">https://doi.org/10.1007/978-3-319-76804-5</a><br/>Format: Electronic Resources<br/>Hardware IP Security and Trustent://SD_ILS/0/SD_ILS:2221512024-07-31T07:26:13Z2024-07-31T07:26:13ZYazar Mishra, Prabhat. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49025-0">https://doi.org/10.1007/978-3-319-49025-0</a><br/>Format: Electronic Resources<br/>Energy Efficient Embedded Video Processing Systems A Hardware-Software Collaborative Approachent://SD_ILS/0/SD_ILS:2266132024-07-31T07:26:13Z2024-07-31T07:26:13ZYazar Khan, Muhammad Usman Karim. author.<br/><a href="https://doi.org/10.1007/978-3-319-61455-7">https://doi.org/10.1007/978-3-319-61455-7</a><br/>Format: Electronic Resources<br/>Introduction to Logic Circuits & Logic Design with Verilogent://SD_ILS/0/SD_ILS:2253862024-07-31T07:26:13Z2024-07-31T07:26:13ZYazar LaMeres, Brock J. author.<br/><a href="https://doi.org/10.1007/978-3-319-53883-9">https://doi.org/10.1007/978-3-319-53883-9</a><br/>Format: Electronic Resources<br/>Computing Platforms for Software-Defined Radioent://SD_ILS/0/SD_ILS:2269982024-07-31T07:26:13Z2024-07-31T07:26:13ZYazar Hussain, Waqar. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49679-5">https://doi.org/10.1007/978-3-319-49679-5</a><br/>Format: Electronic Resources<br/>Digital Systems From Logic Gates to Processorsent://SD_ILS/0/SD_ILS:2226452024-07-31T07:26:13Z2024-07-31T07:26:13ZYazar Deschamps, Jean-Pierre. author.<br/><a href="https://doi.org/10.1007/978-3-319-41198-9">https://doi.org/10.1007/978-3-319-41198-9</a><br/>Format: Electronic Resources<br/>Introduction to Logic Circuits & Logic Design with VHDLent://SD_ILS/0/SD_ILS:2241852024-07-31T07:26:13Z2024-07-31T07:26:13ZYazar LaMeres, Brock J. author.<br/><a href="https://doi.org/10.1007/978-3-319-34195-8">https://doi.org/10.1007/978-3-319-34195-8</a><br/>Format: Electronic Resources<br/>