Login / Signup

Security Rule Checking in IC Design.

Kan XiaoAdib NahiyanMark M. Tehranipoor
Published in: Computer (2016)
Keyphrases
  • functional requirements
  • case study
  • access control
  • computer aided
  • real time
  • data sets
  • databases
  • design space