The Linley Spring Processor Conference focuses on the processors and IP cores used in deep learning, embedded, communications, automotive, IoT, and server designs.
Join Synopsys at the event to learn about maximizing performance and security for embedded applications, and enabling accurate and fast vision processing for automotive ADAS SoCs.
Synopsys Demos
DesignWare EV6 Vision Processor: Object detection, classification and tracking using deep learning
DesignWare ARC Security Subsystem: Security for embedded applications
DesignWare ARC HS Processor: High-performance processing
DesignWare MIPI CSI-2 & I3C IP: Camera and sensor interfaces for automotive applications (in the MIPI Alliance booth)
Synopsys Presentations
Deep-Learning Requirements for Processors in Autonomous Vehicles
Gordon Cooper, Product Marketing Manager I April 11, 2018 I Session 3: Autonomous Cars
Deep-learning techniques for embedded vision processors are critical in the push toward fully autonomous vehicles. Processors must quickly interpret content from images and react. To accomplish this, embedded vision processors must be hardware-optimized for ADAS levels of performance, achieve low power and small area, have efficient programming tools, and support required algorithms. This presentation will discuss the current and next-generation requirements for ADAS vision applications, including the need for accurate power estimation, and discuss the HW/SW evolution to meet ADAS requirements.
Building End-to-End Security into your High Value Embedded Application
Rich Collins, Product Marketing Manager I April 12, 2018 I Session 4: IoT Security
High profile security breaches are commonplace, even within embedded designs, yet many designers fail to implement security features in their SoCs due to lack of knowledge, along with perceived cost and complexity. Synopsys’ end-to-end security subsystem solution combines critical hardware and software elements to reduce complexity and mitigate security knowledge roadblocks. This complete solution protects against malware, device tampering and exploitation of communication protocols targeting high value applications such as integrated SIM, mobile payment, smart energy and automotive telematics.
Registration for the Linley Conference closes on April 5th at 5:00pm.