|
[1] C. Gorman, “Counterfeit Chips on the Rise,” IEEE Spectrum, vol. 49, no. 6, pp. 16-17, 2012. [2] M. Pecht and S. Tiku, “Bogus! Electronic manufacturing and consumers confront a rising tide of counterfeit electronics,” IEEE Spectr, vol. 43, no. 5, pp. 37-46, 2006. [3] R. Chapman and T.S. Durrani, “IP protection of DSP algorithms for system on chip implementation,” IEEE Transactions on Signal Processing, vol. 48, no. 3, pp. 854-861, 2000. [4] A. Rashid, J. Asher, W.H. Mangione-Smith and M. Potkonjak, “Hierarchical watermarking for protection of DSP filter cores,” Proc. of the IEEE Custom Integrated Circuits, pp. 39-42, 1991 [5] A.L. Oliveira, “Techniques for the creation of digital watermarks in sequential circuit designs,” IEEE transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 20, no. 9, pp. 1101-1117, 2001. [6] I. Torunoglu and E. Charbon, “Watermarking-based copyright protection of sequential functions,” Proc. of the IEEE Custom Integrated Circuits, pp. 35-38, 1999. [7] A.T. Abdel-Hamid, S. Tahar and E.M. Aboulharmid, “A public-key watermarking technique for IP designs,” Proc. of the Design, Automation and Test in Europe, vol. 1, pp. 330-335, 2005. [8] A. Cui, C.H. Chang, S. Tahar and A.T. Abdel-Hamid, “A Robust FSM Watermarking Scheme for IP Protection of Sequential Circuit Design,” IEEE Transactions on Computer-Aided Design of Integrated Circuit and Systems, vol. 30, no. 5, pp. 678-690, 2011. [9] C.H. Chang and L. Zhang, “A Blind Dynamic Fingerprinting Technique for Sequential Circuit Intellectual Property Protection,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 33, no. 1, pp. 76-89, 2014. [10] D. Kirovski, Y.Y. Hwang, M. Potkonjak and J. Cong, “Intellectual property protection by watermarking combinational logic synthesis solutions,” IEEE/ACM International Conference on Computer-Aided Design, pp. 194-198, 1998. [11] I. Hong and M. Potkonjak, “Behavioral synthesis techniques for intellectual property protection,” Proc. of the Design Automation Conference, pp. 849-854, 1999. [12] B. Le Gal and L. Bossuet, “Automatic HLS based low-cost IP watermarking,” IEEE 9th International New Circuits and Systems Conference, pp. 490-493, 2011. [13] B. Le Gal, L. Bossuet and D. Dallet, “Mathematical functions based watermarking for IPP,” IEEE International Conference on Electronics, Circuits and Systems, pp. 310-313, 2007. [14] B. Le Gal and L. Bossuet, “Automatic low-cost IP watermarking technique based on output mark insertions,” Design Automation for Embedded Systems, vol. 16, no. 2, pp. 71-92, 2012. [15] J. Kach, W.H. Mangione-Smith and M. Potkonjak, “Robust FPGA intellectual property protection through multiple small watermarks,” Proc. of the Design Automation Conference, pp. 831-836, 1999. [16] K.J. Adarsh, Y. Lin, R.P. Pushkin and Q. Gang, “Zero overhead watermarking technique for FPGA designs,” Proc. of the 13th ACM Great Lakes Symposium on VLSI, pp. 147-152, 2003. [17] S. GuangYu, G. Zhiqiang and X. Yi, “A watermarking system for IP protection by buffer insertion technique,” Porc. of the 7th International Symposium on Quality Electronic Design, pp. 671-675, 2006. [18] Y.C. Fan and H.W. Tsao, “Watermarking for intellectual property protection,” vol. 39, no. 18, pp. 1316-1318, 2003. [19] R. Jain, A. Mujumdar, A. Sharma and H. Wang, “Empirical evaluation of some high-level synthesis scheduling heuristics,” Proc. of the 28th ACM/IEEE Design Automation Conference, pp. 686-689, 1991. [20] R.A. Walker and S. Chaudhuri, “Introduction to the scheduling problem,” IEEE Design and Test of Computers, vol. 12, no. 2, pp. 60-69, 1995. [21] P. Faraboschi, J. Fisher and C. Young, “Instruction scheduling for instruction level parallel processors,” Proc. of the IEEE, vol. 89, no. 11, pp. 1638-1659, 2001. [22] F. Mintzer and G.W. Braudaway, “If one watermark is good, are more better?,” Proc. of the IEEE International Conference Acoustics, Speech, and Signal Processing, vol. 4, pp. 2067-2069, 1999. [23] S.O. Memik, A. Srivastava, E. Kursun and M, Sarrafzadeh, “Algorithmic aspects of uncertainty driven scheduling,” IEEE International Symposium on Circuit and Systems, vol. 3, pp. 763-766, 2002. [24] J. Ramanujam, S. Deshpande, J. Hong, M. Kandemir, “A heuristic for clock selection in high-level synthesis,” Proc. of 7th Asia and South Pacific Design Automation Conference, pp. 414-419, 2002. [25] C.A. Papachristou and H. KonuK, “A linear program driven scheduling and allocation method followed by an interconnect optimization algorithm,” Porc. of the 27th ACM/IEEE Design Automation Conference, pp. 77-83, 1990. [26] P.G. Paulin and J.P. Knight, “Force-directed scheduling for the behavioral synthesis of ASICs,” IEEE Transactions on Computer-Aided Design of Integrated Circuit and Systems, vol. 8, no. 6, pp. 661-679, 1989. [27] S.S. Huang, C.T. Hwang, Y.C. Hsu and Y.J. Oyang, “A New Approach to Schedule Operations Across Nested-ifs And Nested-loops,” Proc. of the 25th Annual International Symposium on Microarchitecture, pp. 268-271, 1992. [28] C. Lee, M. Potkonjak, and W.H. Maggione-Smith, “MediaBench: A Tool for Evaluating and Synthesizing Multimedia and Communications Systems,” Proc. of IEEE International Symposium on Microarchitecture, pp. 330-335, 1997.
|