Keyphrases
- application specific
- information security
- instruction set
- low power consumption
- hardware architecture
- worst case scenario
- dos attacks
- identity management
- connected component labeling
- neural network
- general purpose
- low cost
- high speed
- intrusion detection
- worst case
- multiresolution
- computer architecture
- multi agent systems
- multiscale
- case study