Verification is increasingly complex, and SystemVerilog is one of the languages that the verification community is turning ...
اقرأ المزيد
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
اقرأ المزيد
This volume of High Performance Computing in Science and Engineering is fully dedicated to the final report of KONWIHR, the ...
اقرأ المزيد
Three of the 38 papers deal with computer science, 11 with computational fluid dynamics, two with bio-sciences, six with ...
اقرأ المزيد
High Performance Energy Efficient Microprocessor Design is intended to be a useful companion book for every design engineer ...
اقرأ المزيد
Holonic manufacturing has been an active area of research for the past decade. However, this work has been predominately ...
اقرأ المزيدAn automated system is a combination of both software and hardware which is designed and programmed to work automatically ...
اقرأ المزيد
The investigation of multiscale problems in multibody system contacts is an interesting and timely topic which has been the ...
اقرأ المزيد
This book collects peer-reviewed lectures of the IUTAM Symposium on the 100th anniversary of Boundary Layer research. Covers ...
اقرأ المزيد
This book comprehensively covers the important efforts in improving the quality of images in visual cryptography (VC), with ...
اقرأ المزيد
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
اقرأ المزيد
This book identifies the multiple ways that IEA’s studies of civic and citizenship education have contributed to national ...
اقرأ المزيد
Constitutes the refereed post-proceedings of the 7th International Workshop on Information Hiding, IH 2005, held in Barcelona, ...
اقرأ المزيد
The 4 th Information Security Practice and Experience Conference (ISPEC2008) was held at Crowne Plaza, Darling Harbour, Sydney, ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ...
اقرأ المزيد
As the medical information systems have been integrated in order to address the core of medicine, including patient care ...
اقرأ المزيد
Ingredients for Successful System Level Design Methodology discusses these wish lists, and provides detailed discussions ...
اقرأ المزيد
Why Analyze Innovation Policies From a Knowledge- Based Perspective? It is broadly accepted that we have moved (or are moving) ...
اقرأ المزيد
Only inadequately perceived by the Western public, Korea has transformed into an economic heavy weight during recent decades. ...
اقرأ المزيد