Verification is increasingly complex, and SystemVerilog is one of the languages that the verification community is turning ...
WeiterlesenThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
WeiterlesenThis volume of High Performance Computing in Science and Engineering is fully dedicated to the final report of KONWIHR, the ...
WeiterlesenThree of the 38 papers deal with computer science, 11 with computational fluid dynamics, two with bio-sciences, six with ...
WeiterlesenHigh Performance Energy Efficient Microprocessor Design is intended to be a useful companion book for every design engineer ...
WeiterlesenHolonic manufacturing has been an active area of research for the past decade. However, this work has been predominately ...
WeiterlesenAn automated system is a combination of both software and hardware which is designed and programmed to work automatically ...
WeiterlesenThe investigation of multiscale problems in multibody system contacts is an interesting and timely topic which has been the ...
WeiterlesenThis book collects peer-reviewed lectures of the IUTAM Symposium on the 100th anniversary of Boundary Layer research. Covers ...
WeiterlesenThis book comprehensively covers the important efforts in improving the quality of images in visual cryptography (VC), with ...
WeiterlesenThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
WeiterlesenThis book identifies the multiple ways that IEA’s studies of civic and citizenship education have contributed to national ...
WeiterlesenConstitutes the refereed post-proceedings of the 7th International Workshop on Information Hiding, IH 2005, held in Barcelona, ...
WeiterlesenThe 4 th Information Security Practice and Experience Conference (ISPEC2008) was held at Crowne Plaza, Darling Harbour, Sydney, ...
WeiterlesenThis book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ...
WeiterlesenThis book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ...
WeiterlesenAs the medical information systems have been integrated in order to address the core of medicine, including patient care ...
WeiterlesenIngredients for Successful System Level Design Methodology discusses these wish lists, and provides detailed discussions ...
WeiterlesenWhy Analyze Innovation Policies From a Knowledge- Based Perspective? It is broadly accepted that we have moved (or are moving) ...
WeiterlesenOnly inadequately perceived by the Western public, Korea has transformed into an economic heavy weight during recent decades. ...
Weiterlesen