Buscar
Mostrando ítems 1-7 de 7
Ponencia
Neuromorphic Real-Time Objects Tracking Using Address Event Representation and Silicon Retina
(Springer, 2011)
This paper presents a hierarchical neuromorphic system for tracking objects. We use AER (Address Event Representation) for transmitting and processing visual information provided by an asynchronous temporal contrast silicon ...
Capítulo de Libro
Network Time Synchronization: A Full Hardware Approach
(Springer, 2012)
Complex digital systems are typically built on top of several abstraction levels: digital, RTL, computer, operating system and software application. Each abstraction level greatly facilitates the design task at the cost ...
Ponencia
evercodeML: a formal language for SoC integration
(IEEE Computer Society, 2015)
Complex SoC design devote a great part of the developing time to module integration tasks. The necessity of automating system integration at high-level has yield to the development of module description languages like ...
Ponencia
An AER to CAN Bridge for Spike-Based Robot Control
(Springer, 2011)
Address-Event-Representation (AER) is a bio-inspired communication protocol between chips. A set of AER sensors (retina and cochleas), processors (convolvers, WTA, mappers, …) and actuators can be found in the literature ...
Ponencia
A perfomance comparison study between synchronous and asynchronous FPGA for spike based systems. Under the AER synthetic generation
(IEEE Computer Society, 2011)
Neuromorphic engineering tries to mimic biology in information processing. Address-Event Representation (AER) is a neuromorphic communication protocol for spiking neurons between different layers. AER bio-inspired ...
Artículo
Towards neuromorphic FPGA-based infrastructures for a robotic arm
(Springer, 2023-07)
Muscles are stretched with bursts of spikes that come from motor neurons connected to the cerebellum through the spinal cord. Then, alpha motor neurons directly innervate the muscles to complete the motor command coming ...
Artículo
Protecting FPGA-Based Cryptohardware Implementations from Fault Attacks Using ADCs
(MDPI, 2024-02-29)
The majority of data exchanged between connected devices are confidential and must be protected against unauthorized access. To ensure data protection, so-called cryptographic algorithms are used. These algorithms have ...