الكتب الالكترونية

عدد الكتب: 141 - 160 /267
978-3-540-68783-2
Geometric Modelling, Numerical Simulation, and Optimization:

This book present scurrent activities of the Department of AppliedMathem- ics at SINTEF, the largest independent research ...

اقرأ المزيد
978-3-540-35655-4
Global RFID : The Value of the EPCglobal Network for Supply Chain Management

At the same time, I was a junior Brand Manager at Procter & Gamble w- ried about a much more mundane problem: how to keep ...

اقرأ المزيد
NoIMG
Global Specification and Validation of Embedded Systems

Global modelling and validation is required to master the design of systems made of heterogeneous components. These systems ...

اقرأ المزيد
978-0-387-25036-6
Graph Theory, Combinatorics and Algorithms

focuses on discrete mathematics and combinatorial algorithms interacting with real world problems in computer science, operations ...

اقرأ المزيد
978-0-387-32942-0
Handbook on Modelling for Discrete Optimization

This handbook couples the difficult, critical-thinking aspects of mathematical modeling with the hot area of discrete optimization. ...

اقرأ المزيد
9781789809770
Hands-On Design Patterns with Java : Learn Design Patterns That Enable the Building of Large-Scale Software Architectures / Edward Lavieri

Java design patterns are reusable and proven solutions to software design problems. This book covers over 60 battle-tested ...

اقرأ المزيد
978-0-387-36254-0
Hardware Verification with C++

Part I makes the case for C++, and shows a standard verification system using object-oriented programming (OOP). Part II ...

اقرأ المزيد
978-0-387-71740-1
Hardware Verification with SystemVerilog

Verification is increasingly complex, and SystemVerilog is one of the languages that the verification community is turning ...

اقرأ المزيد
978-3-540-77966-7
Hardware and Software: Verification and Testing : Third International Haifa Verification Conference, HVC 2007, Haifa, Israel, October 23-25, 2007. Proceedings

These are the conference proceedings of the 4th Haifa Verifcation Conference, held October 27–30, 2008 in Haifa, Israel. ...

اقرأ المزيد
978-3-540-34582-4
High Availability and Disaster Recovery

Companies and other organizations depend more than ever on the availability of their Information Technology, and most mission ...

اقرأ المزيد
978-3-540-35074-3
High Performance Computing on Vector Systems

The book presents the state of the art in high performance computing and simulation on modern supercomputer architectures. ...

اقرأ المزيد
978-3-540-35074-3
High Performance Computing on Vector Systems

The book presents the state of the art in high performance computing and simulation on modern supercomputer architectures. ...

اقرأ المزيد
978-3-540-74384-2
High Performance Computing on Vector Systems 2007

The following book presents contributions from the 6th TERAFLOP Workshop which was hosted by Tohoku University in Sendai, ...

اقرأ المزيد
978-1-4020-8588-8
High-Level Synthesis : From Algorithm to Digital Circuit

This book presents an excellent collection of contributions addressing different aspects of high-level synthesis from both ...

اقرأ المزيد
978-0-387-24168-5
History of Nordic Computing

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

اقرأ المزيد
978-3-030-61705-9
Hybrid Artificial Intelligent Systems

This book constitutes the refereed proceedings of the 15th International Conference on Hybrid Artificial Intelligent Systems, ...

اقرأ المزيد
978-1-84628-117-4
Information Processing with Evolutionary Algorithms

The last decade of the 20th century has witnessed a surge of interest in num- ical, computation-intensive approaches to information ...

اقرأ المزيد
978-3-540-71093-6
Information Security Applications

This book constitutes the thoroughly refereed post-proceedings of the 12th International Monterey Workshop on Networked Systems ...

اقرأ المزيد
978-3-030-65299-9
Information Security Applications

This book constitutes the thoroughly refereed proceedings of the 21st International Conference on Information Security Applications, ...

اقرأ المزيد
978-3-540-33153-7
Information Security Applications (vol. # 3786)

Constitutes the refereed proceedings of the 6th International Workshop on Information Security Applications, held in 2005. ...

اقرأ المزيد
عدد الكتب: 141 - 160 /267