Showing items related by title, author, creator and subject.
Increasing security for regulatory constrained systems, through new systems and architecture methodologies Pramanik, SarahIn the Department of Defense (DoD) vulnerabilities can result in casualties, destruction of assets, or potentially allow the enemy to either escape or infiltrate a system. This is true for other systems such as those in ...
Rostampour, A. R.; Azimi-Sadjadi, Mahmood R. (Colorado State University. LibrariesIEEE, 1989)This paper is concerned with the development and design of parallel and pipeline architectures for 2-D recursive and nonrecursive block digital filter. In this regard, several high speed structures using single-instruction ...