Notice
There is currently an issue with the citation download feature. Learn more

2007 44th ACM/IEEE Design Automation Conference

4-8 June 2007

Filter Results

Displaying Results 1 - 25 of 215
  • General Chair's Message

    Publication Year: 2007, Page(s): i
    IEEE is not the copyright holder of this material | PDF file iconPDF (536 KB)
    Freely Available from IEEE
  • A. Richard Newton, 1951 - 2007

    Publication Year: 2007, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (362 KB) | HTML iconHTML
    Freely Available from IEEE
  • Executive Committee

    Publication Year: 2007, Page(s):iii - iv
    IEEE is not the copyright holder of this material | PDF file iconPDF (671 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2007, Page(s):v - vii
    IEEE is not the copyright holder of this material | PDF file iconPDF (140 KB)
    Freely Available from IEEE
  • Tutorial Committee

    Publication Year: 2007, Page(s): vii
    IEEE is not the copyright holder of this material | PDF file iconPDF (51 KB)
    Freely Available from IEEE
  • Panel Committee

    Publication Year: 2007, Page(s): viii
    IEEE is not the copyright holder of this material | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • Exhibitor Liaison Committee

    Publication Year: 2007, Page(s): viii
    IEEE is not the copyright holder of this material | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • Strategy Committee

    Publication Year: 2007, Page(s): ix
    IEEE is not the copyright holder of this material | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Student Design Contest Judges

    Publication Year: 2007, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Designing a New Automotive DNA

    Publication Year: 2007, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (589 KB)
    Freely Available from IEEE
  • Perspective of the Future Semiconductor Industry: Challenges and Solutions

    Publication Year: 2007, Page(s): xii
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (55 KB)
    Freely Available from IEEE
  • Design without Borders - A Tribute to the Legacy of A. Richard Newton

    Publication Year: 2007, Page(s): xiii
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (446 KB)
    Freely Available from IEEE
  • Marie R. Pistilli Women in EDA Achievement Award

    Publication Year: 2007, Page(s):xiv - xix
    IEEE is not the copyright holder of this material | PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2007, Page(s):xx - xxiii
    IEEE is not the copyright holder of this material | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • Call for Papers

    Publication Year: 2007, Page(s):xxiv - xxvi
    IEEE is not the copyright holder of this material | PDF file iconPDF (55 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2007, Page(s):nil1 - nil15
    Request permission for commercial reuse | PDF file iconPDF (268 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2007, Page(s):nil16 - nil21
    IEEE is not the copyright holder of this material | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • Trusted Hardware: Can It Be Trustworthy?

    Publication Year: 2007, Page(s):1 - 4
    Cited by:  Papers (1)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (175 KB)

    Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important consideration during hardware design and fabrication. For instance, devices are increasingly required to store confidential information. This includes data such as cryptographic keys, personal information, and the intellect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trusted Design in FPGAs

    Publication Year: 2007, Page(s):5 - 8
    Cited by:  Papers (11)  |  Patents (10)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (335 KB) | HTML iconHTML

    Using FPGAs, a designer can separate the design process from the manufacturing flow. Therefore, the owner of a sensitive design need not expose the design to possible theft and tampering during its manufacture, dramatically simplifying the process of assuring trust in that design. Modern FPGAs include bitstream security features that turn the fielded design trust problem into an information securi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Physical Unclonable Functions for Device Authentication and Secret Key Generation

    Publication Year: 2007, Page(s):9 - 14
    Cited by:  Papers (217)  |  Patents (63)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (486 KB) | HTML iconHTML

    Physical Unclonable Functions (PUFs) are innovative circuit primitives that extract secrets from physical characteristics of integrated circuits (ICs). We present PUF designs that exploit inherent delay characteristics of wires and transistors that differ from chip to chip, and describe how PUFs can enable low-cost authentication of individual ICs and generate volatile secret keys for cryptographi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Side-Channel Attack Pitfalls

    Publication Year: 2007, Page(s):15 - 20
    Cited by:  Papers (6)  |  Patents (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (399 KB) | HTML iconHTML

    While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel attacks. Without expensive equipment or intrusive monitoring, these attacks bypass the mathematical complexity and find the cryptographic key by observing the power consumption or the execution time variations of the device... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Megatrends and EDA 2017

    Publication Year: 2007, Page(s):21 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (178 KB) | HTML iconHTML

    Today's megatrends include: Consumer cycles at 6-12 months (and getting faster) Process technology accelerating through 45nm (but with higher risks and lower yields) Fewer platform SOCs (each requiring more specialized hardware and software design tools) The search for 3-4 more `waves' for the semiconductor industry to ride to $IT by the end of the CMOS roadmap Design as a key enabler of Moore's L... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • System-Level Design Flow Based on a Functional Reference for HW and SW

    Publication Year: 2007, Page(s):23 - 28
    Cited by:  Papers (5)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (330 KB) | HTML iconHTML

    Heterogeneous MPSoC design where flexible programmable cores are combined with optimized HW co-processors is a quite complex and challenging task. In this paper, we present a system- level design flow that uses a single functional reference for modeling both HW and SW. The models follow an interface- centric design approach based on the TTL interface (Task Transaction Level). TTL models are applie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-driven Validation of SystemC Designs

    Publication Year: 2007, Page(s):29 - 34
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (615 KB) | HTML iconHTML

    Functional test generation for dynamic validation of current system level designs is a challenging task. Manual test writing or automated random test generation techniques are often used for such validation practices. However, directing tests to particular reachable states of a SystemC model is often difficult, especially when these models are large and complex. In this work, we present a model-dr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Language Extensions to SystemC: Process Control Constructs

    Publication Year: 2007, Page(s):35 - 38
    Cited by:  Papers (3)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (205 KB) | HTML iconHTML

    The SystemC language has established itself as a popular choice for both modeling and verification at the system level. A well known deficiency in SystemC is the lack of process control constructs - e.g., suspend-resume, kill, reset - that are necessary in many applications domains. This paper identifies and describes a fundamental set of general purpose SystemC kernel extensions that fulfills thi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.