In this work, algorithms and architectures for cryptography and source coding are developed, which are suitable for many resource-constrained embedded systems s
In this work, algorithms and architectures for cryptography and source coding are developed, which are suitable for many resource-constrained embedded systems s
Design safe and reliable software for embedded systems and explore the internals of device drivers, RTOS, and TEE Key Features Identify and overcome challenges
This book is a comprehensive collection of chapters focusing on the core areas of computing and their further applications in the real world. Each chapter is a
This book is an introduction to the fundamentals of emerging non-volatile memories and provides an overview of future trends in the field. Readers will find cov