TITLE

Embedded-system design: Exploring trade-offs

AUTHOR(S)
Levy, Markus
PUB. DATE
May 2000
SOURCE
EDN;05/25/2000, Vol. 45 Issue 11, p58
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Evaluates the performance of several embedded-computer evaluation boards in the United States as of May 25, 2000. Integrated Device Technology's IDT79 board; Use of the `Electronic Design News' periodical's Embedded Microprocessor Benchmark Consortium benchmarks in the tests; Examination of processor configurations for JPEG compression.
ACCESSION #
3194824

 

Related Articles

  • Motorola, IDT add to embedded lines.  // Electronic News;12/19/94, Vol. 40 Issue 2045, p50 

    Reports on the introduction of embedded systems products by Motorola Inc. and Integrated Device Technology Inc. Features; Price; Memory storage capacity.

  • IDT Offers Embedded MIPS Core Logic. CASSELL, JONATHAN // Electronic News;02/15/99, Vol. 45 Issue 2257, p18 

    Reports on the entry of Integrated Device Technology Inc. into the market for million instructions per second (MIPS)-based embedded systems with its introduction of a pair of devices. Information on the devices, the RC32134 and RC64145 system controllers; Public offering and 1998 sales of...

  • National, AMD, IDT set to unveil embedded offerings. Detar, Jim // Electronic News;10/17/94, Vol. 40 Issue 2036, p87 

    Focuses on new offerings of embedded processors from National Semiconductor Corp., Advanced Micro Devices Inc. and Integrated Device Technology (IDT) Incorporated. Features and capabilities.

  • A Simple Mechanism for Type Security Across Compilation Units. Scott, Michael L.; Finkel, Raphael A. // IEEE Transactions on Software Engineering;Aug88, Vol. 14 Issue 8, p1238 

    A simple technique detects structural type clashes across compilation units with an arbitrarily high degree of confidence. The type of each external object is described in canonical form. A hash function compresses the description into a short code. lithe code is embedded in a symbol-table name,...

  • Reversible Data Hiding Scheme Based on Maximum Histogram Gap of Image Blocks. Arabzadeh, Mohammad; Reza Rahimi, Mohammad // KSII Transactions on Internet & Information Systems;Aug2012, Vol. 6 Issue 8, p1964 

    In this paper a reversible data hiding scheme based on histogram shifting of host image blocks is presented. This method attempts to use full available capacity for data embedding by dividing the image into non-overlapping blocks. Applying histogram shifting to each block requires that extra...

  • USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION. Rudder, Andrew; Goodridge, Wayne; Mohammed, Shareeda // International Journal of Network Security & Its Applications;Mar2013, Vol. 5 Issue 2, p65 

    In this paper, we propose a reversible data hiding method in the spatial domain for compressed grayscale images. The proposed method embeds secret bits into a compressed thumbnail of the original image by using a novel interpolation method and the Neighbour Mean Interpolation (NMI) technique as...

  • The Effect of Watermark Embedding on Signature Generation in Image Association Technique of Copyright Protection System. Suleiman Al Rababaa, Mamoun // International Journal of Computer Applications;Apr2014, Vol. 91, p1 

    The current research enhances the performance of an already proposed image protection system presented earlier. The former system relies on an association technique instead of embedding owner signature inside an image like traditional watermarking methods. Thus, it retains secured image...

  • A Simultaneous Implementation of Message Encoding using LSB Stegnography & Image Compression using Lifting Scheme on FPGA. Jondhale, S. R.; Ansari, A. H. // International Journal of Computer Applications;Apr2012, Vol. 43, p40 

    The data in digital images can be manipulated to some extend without being detected by human eyes. An example of such manipulations is insertion of secret information which is often referred to as information hiding. In this research we embedded the secret text data in spatial domain of a given...

  • Multiwavelet-based Image Compression Using Human Visual System Model. Aili Wang; Shaoliang Meng // International Proceedings of Computer Science & Information Tech;2012, Vol. 53, p189 

    Multiwavelet has some important properties such as orthogonality, symmetry, and short support, which make up for the shortcoming of scalar wavelet. In this paper, we consider the problem of improving the performance of multiwavelet-based image coders combining human visual system (HVS). By...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics