Gezel

Gezel is a hardware description language, allowing the implementation of a Finite State Machine + Datapath (FSMD) model. The tools included in Gezel… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2002-2011
02420022011

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
Simulators are important tools for analyzing and evaluating different design options for wireless sensor networks (sensornets… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
2011
2011
Hardware-software co-design techniques are very suitable to develop the next generation of sensornet applications, which have… (More)
  • figure 2.1
  • figure 2.2
  • figure 3.1
  • figure 3.2
  • figure 3.3
Is this relevant?
2007
2007
This paper presents an efficient software implementation of the Montgomery modular multiplication algorithm on a multi-core… (More)
Is this relevant?
2006
2006
In this article, we present Gezel, a component-based, electronic system-level (ESL) design environment for heterogeneous designs… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2006
2006
Energy-efficient embedded systems rely on domain-specific coprocessors for dedicated tasks such as baseband processing, video… (More)
  • figure 1
  • figure 2
  • table I
  • figure 3
  • table II
Is this relevant?
2005
2005
Implementing public-key cryptography on platforms with limited resources, such as microprocessors, is a challenging task… (More)
  • table 1
  • figure 1
  • table 2
  • table 3
  • figure 2
Is this relevant?
2005
2005
We describe race-free properties of a hardware description language called GEZEL. The language describes networks of cycle-true… (More)
  • figure 1
  • table 1
Is this relevant?
2004
2004
New applications and standards are first conceived only for functional correctness and without concerns for the target… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
2004
2004
This paper describes a design approach to include and optimize Java based cryptographic applications into resource limited… (More)
  • figure 1
  • table 1
  • figure 2
  • table 2
  • figure 4
Is this relevant?
2002
2002
Security processors are used to implement cryptographic algorithms with high throughput and/ or low energy consumption… (More)
  • figure 2
  • figure 3
  • table 2
  • figure 4
  • table 3
Is this relevant?