Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hardware Design Verification : Simulation and Formal Method-Based Approaches
Hardware Design Verification : Simulation and Formal Method-Based Approaches

The Practical, Start-to-Finish Guide to Modern Digital Design Verification

As digital logic designs grow larger and more complex, functional verification has become the number one bottleneck in the design process. Reducing verification time is crucial to project success,...

Logics in Artificial Intelligence: 13th European Conference, JELIA 2012, Toulouse, France, September 26-28, 2012, Proceedings (Lecture Notes in Computer Science)
Logics in Artificial Intelligence: 13th European Conference, JELIA 2012, Toulouse, France, September 26-28, 2012, Proceedings (Lecture Notes in Computer Science)

This book constitutes the refereed proceedings of the 13th European Conference on Logics in Artificial Intelligence, held in Toulouse, France, in September 2012. The book includes 3 invited talks, 36 regular papers, and 5 system descriptions, selected from 107 submissions. The papers cover various aspects of theory and methods of logic for...

Computer Science Logo Style 2/e, Vol. 3: Beyond Programming
Computer Science Logo Style 2/e, Vol. 3: Beyond Programming
The phrase “computer science” is still, in some circles, battling for acceptance. Some
people, not necessarily antagonistic to computers, consider it an illegitimate merger of
two disconnected ideas (much as I feel myself about the phrase “computer literacy”). They
don’t see where the science comes in;
...
Parsing Techniques: A Practical Guide (Monographs in Computer Science)
Parsing Techniques: A Practical Guide (Monographs in Computer Science)
Parsing, also referred to as syntax analysis, has been and continues to be an essential part of computer science and linguistics. Today, parsing techniques are also implemented in a number of other disciplines, including but not limited to, document preparation and conversion, typesetting chemical formulae, and chromosome recognition.

This...

Mathematical Models for Systems Reliability
Mathematical Models for Systems Reliability
Evolved from the lectures of a recognized pioneer in developing the theory of reliability, Mathematical Models for Systems Reliability provides a rigorous treatment of the required probability background for understanding reliability theory.

This classroom-tested text begins by discussing the Poisson process and its associated...

35 Years of Fuzzy Set Theory: Celebratory Volume Dedicated to the Retirement of Etienne E. Kerre
35 Years of Fuzzy Set Theory: Celebratory Volume Dedicated to the Retirement of Etienne E. Kerre

This book is a tribute to Etienne E. Kerre on the occasion of his retirement on October 1st, 2010, after being active for 35 years in the field of fuzzy set theory. It gathers contributions from researchers that have been close to him in one way or another during his long and fruitful career. Besides a foreword by Lotfi A. Zadeh, it contains...

Formal Languages and Compilation (Texts in Computer Science)
Formal Languages and Compilation (Texts in Computer Science)

The book collects and condenses the experience of years of teaching compiler courses and doing research on formal language theory, on compiler and language design, and to a lesser extent on natural language processing. In the turmoil of information technology developments, the subject of the book has kept the same fundamental...

Windows PowerShell in Action, Second Edition
Windows PowerShell in Action, Second Edition

Well, it’s been a wild ride since the first edition of this book was released. At that time, PowerShell had just shipped and had a fairly limited scope of influence. Things have changed a lot. PowerShell now ships in the box with Windows (at least Windows 7 and Server 2008 R2). The number of PowerShell users is now in the hundreds...

Computer Security Fundamentals (2nd Edition)
Computer Security Fundamentals (2nd Edition)

It has been more than 6 years since the publication of the original edition of this book. A great deal has happened in the world of computer security since that time. This edition is updated to include newer information, updated issues, and revised content.

The real question is who is this book for. This book is...

Endoscopic Surgery of the Potential Anatomical Spaces
Endoscopic Surgery of the Potential Anatomical Spaces
“Anatomical potential spaces” is an attractive and no more abstract concept that offers new perspectives to a surgical world that is rapidily changing and becoming more complex.

Powerful new technologies demand our attention and testify that our clinical work and research are deeply influenced by
...
Seamless Learning: Perspectives, Challenges and Opportunities (Lecture Notes in Educational Technology)
Seamless Learning: Perspectives, Challenges and Opportunities (Lecture Notes in Educational Technology)

This book introduces readers to the latest state of research and development in seamless learning. It consolidates various approaches to and practices in seamless learning from a range of techno-pedagogical, socio-situated and socio-cultural perspectives. Further, it details our current understanding of learning...

Modeling Business Objects with XML Schema (The Morgan Kaufmann Series in Software Engineering and Programming)
Modeling Business Objects with XML Schema (The Morgan Kaufmann Series in Software Engineering and Programming)
XML Schema is the new language standard from the W3C and the new foundation for defining data in Web-based systems. There is a wealth of information available about Schemas but very little understanding of how to use this highly formal specification for creating documents. Grasping the power of Schemas means going back to the basics of documents...
unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy