Verification is increasingly complex, and SystemVerilog is one of the languages that the verification community is turning ...
اقرأ المزيدThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
اقرأ المزيدThis volume of High Performance Computing in Science and Engineering is fully dedicated to the final report of KONWIHR, the ...
اقرأ المزيدThree of the 38 papers deal with computer science, 11 with computational fluid dynamics, two with bio-sciences, six with ...
اقرأ المزيدHigh Performance Energy Efficient Microprocessor Design is intended to be a useful companion book for every design engineer ...
اقرأ المزيدHolonic manufacturing has been an active area of research for the past decade. However, this work has been predominately ...
اقرأ المزيدAn automated system is a combination of both software and hardware which is designed and programmed to work automatically ...
اقرأ المزيدThe investigation of multiscale problems in multibody system contacts is an interesting and timely topic which has been the ...
اقرأ المزيدThis book collects peer-reviewed lectures of the IUTAM Symposium on the 100th anniversary of Boundary Layer research. Covers ...
اقرأ المزيدThis book comprehensively covers the important efforts in improving the quality of images in visual cryptography (VC), with ...
اقرأ المزيدThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
اقرأ المزيدThis book identifies the multiple ways that IEA’s studies of civic and citizenship education have contributed to national ...
اقرأ المزيدConstitutes the refereed post-proceedings of the 7th International Workshop on Information Hiding, IH 2005, held in Barcelona, ...
اقرأ المزيدThe 4 th Information Security Practice and Experience Conference (ISPEC2008) was held at Crowne Plaza, Darling Harbour, Sydney, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ...
اقرأ المزيدAs the medical information systems have been integrated in order to address the core of medicine, including patient care ...
اقرأ المزيدIngredients for Successful System Level Design Methodology discusses these wish lists, and provides detailed discussions ...
اقرأ المزيدWhy Analyze Innovation Policies From a Knowledge- Based Perspective? It is broadly accepted that we have moved (or are moving) ...
اقرأ المزيدOnly inadequately perceived by the Western public, Korea has transformed into an economic heavy weight during recent decades. ...
اقرأ المزيد