Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Digital Design with RTL Design, VHDL, and Verilog
Digital Design with RTL Design, VHDL, and Verilog

An eagerly anticipated, up-to-date guide to essential digitaldesign fundamentals

Offering a modern, updated approach to digital design, thismuch-needed book reviews basic design fundamentals before divinginto specific details of design optimization. You begin with anexamination of the low-levels of design, noting a clear...

Piezotronics and Piezo-Phototronics (Microtechnology and MEMS)
Piezotronics and Piezo-Phototronics (Microtechnology and MEMS)

The fundamental principle of piezotronics and piezo-phototronics were introduced by Wang in 2007 and 2010, respectively. Due to the polarization of ions in a crystal that has non-central symmetry in materials, such as the wurtzite structured ZnO, GaN and InN, a piezoelectric potential (piezopotential) is created in the crystal by applying a...

Post-Fordist Cinema: Hollywood Auteurs and the Corporate Counterculture (Film and Culture Series)
Post-Fordist Cinema: Hollywood Auteurs and the Corporate Counterculture (Film and Culture Series)
The New Hollywood boom of the late 1960s and 1970s is celebrated as a time when maverick directors bucked the system. Against the backdrop of counterculture sensibilities and the prominence of auteur theory, New Hollywood directors such as Robert Altman and Francis Ford Coppola seemed to embody creative individualism. In Post-Fordist...
Inside the SQL Server Query Optimizer
Inside the SQL Server Query Optimizer

The SQL Server Query Optimizer is perceived by many to be a magic black box, transforming SQL queries into high performance execution plans in the blink of an eye through some unknowable process. The truth is that, while the Query Optimizer is indeed the highly-complex result of decades of research, learning how it works its magic is not only...

Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The techniques discussed show readers how to perform their own evaluation of new and emerging security...
Confessions of an IT Manager
Confessions of an IT Manager

Phil Factor is a legend in his own runtime. Scurrilous, absurd, confessional and scathing by turns, Confessions of an IT Manager targets the idiocy, incompetence and overreach of the IT management industry from vantage point all the way up and down the greasy pole. Phil Factor (real name witheld to protest the guilty) has over 20 years...

Energy Efficient Hardware-Software Co-Synthesis Using Reconfigurable Hardware
Energy Efficient Hardware-Software Co-Synthesis Using Reconfigurable Hardware

The integration of multi-million-gate configurable logic, pre-compiled heterogeneous hardware components, and on-chip processor subsystems offer high computation capability and exceptional design flexibility to modern reconfigurable hardware. Moshe Gavrielov, the recently appointed president and CEO of Xilinx, which is the largest...

Digital Electronics: A Practical Approach with VHDL (9th Edition)
Digital Electronics: A Practical Approach with VHDL (9th Edition)
This ninth edition of Digital Electronics: A Practical Approach with VHDL provides the fundamentals of digital circuitry to students in engineering and technology curricula. The digital circuits are introduced using fixed-function 7400 ICs and evolve into FPGA (Field Programmable Gate Arrays) programmed with VHDL (VHSIC Hardware...
Introduction to Embedded System Design Using Field Programmable Gate Arrays
Introduction to Embedded System Design Using Field Programmable Gate Arrays

"Introduction to Embedded System Design Using Field Programmable Gate Arrays" provides a starting point for the use of field programmable gate arrays in the design of embedded systems. The text considers a hypothetical robot controller as an embedded application and weaves around it related concepts of FPGA-based digital design. The...

Quantum Computing without Magic: Devices (Scientific and Engineering Computation)
Quantum Computing without Magic: Devices (Scientific and Engineering Computation)
"Quantum Computing without Magic gives a refreshing and down to earth approach to quantum information as well as quantum devices which will have a fundamental impact on the technology of the 21st century."
Raymond Laflamme, Canada Research Chair in Quantum Information, and Director, Institute for
...
Advanced Simulation and Test Methodologies for VLSI Design
Advanced Simulation and Test Methodologies for VLSI Design

With the advent of LSI and subsequently VLSI, technology has never witnessed such an unprecedented growth in the use of electronic systems in a wide range of applications. Although the ability to integrate several hundreds of thousands of transistors into a monolithic integrated circuit offers many advantages, a major concern in the...

Principles of Cloning
Principles of Cloning
In 1997, Dolly the cloned sheep began a biological revolution. She showed us the way to physiologically dedifferentiate already committed somatic cells, opening the gate to a whole new world of possibilities in the study of basic biological mechanisms that touch the origins of life at its core. It is clear that cloning vertebrates...
unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy