As of January 1999, under European Union ruling, 40 tonne vehicles have been allowed on UK roads, leading to a challenging ...
اقرأ المزيد
These guidelines convey in condensed form the authors' many years of experience in detecting thermal engineering defects ...
اقرأ المزيدHDPE (High-density polyethylene) geomembranes are nowadays widely used for large-area liners and construction sealings in ...
اقرأ المزيد
Since the debut of the original edition, the Handbook of Psychodiagnostic Testing has been an invaluable aid to students ...
اقرأ المزيد
Verification is increasingly complex, and SystemVerilog is one of the languages that the verification community is turning ...
اقرأ المزيد
The Haifa Verification Conference 2006 took place for the second year in a row at the IBM Haifa Research Lab and at the Haifa ...
اقرأ المزيد
The First Haifa Verification Conference was held at the IBM Haifa Research Lab and at the Haifa University in Israel from ...
اقرأ المزيد
High Performance Energy Efficient Microprocessor Design is intended to be a useful companion book for every design engineer ...
اقرأ المزيد
How to Code .NET: Tips and Tricks for Coding .NET 1.1 and .NET 2.0 Applications Effectively provides solutions to certain ...
اقرأ المزيد
This book is designed to assess how well students are prepared for study, work and life in a digital world. The study measures ...
اقرأ المزيد
Gives an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and ...
اقرأ المزيدInnovations in E-learning, Instruction Technology, Assessment and Engineering Education is a collection of world class paper ...
اقرأ المزيد
This book, inspired by the ICME 13 Thematic Afternoon on “European Didactic Traditions”, takes readers on a journey ...
اقرأ المزيد
Expounds on the related technologies of intelligent transportation infrastructure construction. Based on the essential characteristics ...
اقرأ المزيد
Provides an in-depth introduction to software design, with a focus on object-oriented design, and using the Java programming ...
اقرأ المزيد
This methodological book summarises existing analysing techniques using data from PIAAC, a study initiated by the OECD that ...
اقرأ المزيد
It is essential for circuit and system designers to understand the components of leakage, sensitivity of leakage to different ...
اقرأ المزيد
The three-volume set LNCS 12476 - 12478 constitutes the refereed proceedings of the 9th International Symposium on Leveraging ...
اقرأ المزيد
The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services ...
اقرأ المزيد
Provides a timely and coherent account of the recent advances in many-core computing research. Starting with programming ...
اقرأ المزيد