Verification is increasingly complex, and SystemVerilog is one of the languages that the verification community is turning ...
Continue readingThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Continue readingThis volume of High Performance Computing in Science and Engineering is fully dedicated to the final report of KONWIHR, the ...
Continue readingThree of the 38 papers deal with computer science, 11 with computational fluid dynamics, two with bio-sciences, six with ...
Continue readingHigh Performance Energy Efficient Microprocessor Design is intended to be a useful companion book for every design engineer ...
Continue readingHolonic manufacturing has been an active area of research for the past decade. However, this work has been predominately ...
Continue readingAn automated system is a combination of both software and hardware which is designed and programmed to work automatically ...
Continue readingThe investigation of multiscale problems in multibody system contacts is an interesting and timely topic which has been the ...
Continue readingThis book collects peer-reviewed lectures of the IUTAM Symposium on the 100th anniversary of Boundary Layer research. Covers ...
Continue readingThis book comprehensively covers the important efforts in improving the quality of images in visual cryptography (VC), with ...
Continue readingThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Continue readingThis book identifies the multiple ways that IEA’s studies of civic and citizenship education have contributed to national ...
Continue readingConstitutes the refereed post-proceedings of the 7th International Workshop on Information Hiding, IH 2005, held in Barcelona, ...
Continue readingThe 4 th Information Security Practice and Experience Conference (ISPEC2008) was held at Crowne Plaza, Darling Harbour, Sydney, ...
Continue readingThis book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ...
Continue readingThis book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ...
Continue readingAs the medical information systems have been integrated in order to address the core of medicine, including patient care ...
Continue readingIngredients for Successful System Level Design Methodology discusses these wish lists, and provides detailed discussions ...
Continue readingWhy Analyze Innovation Policies From a Knowledge- Based Perspective? It is broadly accepted that we have moved (or are moving) ...
Continue readingOnly inadequately perceived by the Western public, Korea has transformed into an economic heavy weight during recent decades. ...
Continue reading