In addition, the author provides an overview of methods for mapping programs to implementation platforms, including multi-core platforms, and discusses evaluation methods and authentication for embedded systems. Since embedded systems must operate under strict parameters, the book also includes a collection of hand-picked optimization techniques, such as software optimization techniques. In […]