Model checking technology is among the foremost applications of logic to computer science and computer engineering. The model ...
Continue readingThis book is so far the first that covers the current state of the art in 3D imaging for safety and security. Special attention ...
Continue readingThis book is so far the first that covers the current state of the art in 3D imaging for safety and security. Special attention ...
Continue readingThis book gives a comprehensive account of Maude, a language and system based on rewriting logic. Many examples are used ...
Continue readingThis book gives a comprehensive account of Maude, a language and system based on rewriting logic. Many examples are used ...
Continue readingThis book celebrates Professor Peter Marwedel's outstanding achievements in compilers, embedded systems, and cyber-physical ...
Continue readingSystemVerilog language consists of three very specific areas of constructs - design, assertions and testbench. This guide ...
Continue readingPractical Introduction to PSL is primarily targeted to hardware designers and verification engineers who plan to use PSL. ...
Continue readingThis book develops the answers to these questions and fits them into a roadmap for formal property verification – a roadmap ...
Continue readingARIS is ranked as the leading Business Process Modelling tool in the Gartner Quadrant for Business Process Analysis and Optimization. ...
Continue readingThis book constitutes the refereed proceedings of the First International Conference of Abstract State Machines, B and Z, ...
Continue readingThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Continue readingThis book originates from an international summer school on biometrics, held in Alghero, Italy, in June 2003. The seven revised ...
Continue readingThis book presents the state-of-the-practice in successfully engineered self-organizing systems, and examines ways to balance ...
Continue readingThis book constitutes the refereed proceedings of the Brazilian Symposium on Bioinformatics, BSB 2005, The 15 revised full ...
Continue readingThis book presents a comprehensive treatment of biometrics and offers coverage of the entire gamut of topics in the field, ...
Continue readingThis book cover theory, practice, applications, and experiences related to secure software.
Continue readingThis book cover theory, practice, applications, and experiences related to secure software.
Continue readingThis book Covering all current aspects of computer and network security, the papers are organized in topical sections on ...
Continue readingThis book Covering all current aspects of computer and network security, the papers are organized in topical sections on ...
Continue reading