Verification is increasingly complex, and SystemVerilog is one of the languages that the verification community is turning ...
Lire la suiteThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Lire la suiteThis volume of High Performance Computing in Science and Engineering is fully dedicated to the final report of KONWIHR, the ...
Lire la suiteThree of the 38 papers deal with computer science, 11 with computational fluid dynamics, two with bio-sciences, six with ...
Lire la suiteHigh Performance Energy Efficient Microprocessor Design is intended to be a useful companion book for every design engineer ...
Lire la suiteHolonic manufacturing has been an active area of research for the past decade. However, this work has been predominately ...
Lire la suiteAn automated system is a combination of both software and hardware which is designed and programmed to work automatically ...
Lire la suiteThe investigation of multiscale problems in multibody system contacts is an interesting and timely topic which has been the ...
Lire la suiteThis book collects peer-reviewed lectures of the IUTAM Symposium on the 100th anniversary of Boundary Layer research. Covers ...
Lire la suiteThis book comprehensively covers the important efforts in improving the quality of images in visual cryptography (VC), with ...
Lire la suiteThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Lire la suiteThis book identifies the multiple ways that IEA’s studies of civic and citizenship education have contributed to national ...
Lire la suiteConstitutes the refereed post-proceedings of the 7th International Workshop on Information Hiding, IH 2005, held in Barcelona, ...
Lire la suiteThe 4 th Information Security Practice and Experience Conference (ISPEC2008) was held at Crowne Plaza, Darling Harbour, Sydney, ...
Lire la suiteThis book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ...
Lire la suiteThis book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ...
Lire la suiteAs the medical information systems have been integrated in order to address the core of medicine, including patient care ...
Lire la suiteIngredients for Successful System Level Design Methodology discusses these wish lists, and provides detailed discussions ...
Lire la suiteWhy Analyze Innovation Policies From a Knowledge- Based Perspective? It is broadly accepted that we have moved (or are moving) ...
Lire la suiteOnly inadequately perceived by the Western public, Korea has transformed into an economic heavy weight during recent decades. ...
Lire la suite