Home | Amazing | Today | Tags | Publishers | Years | Search 
Intellectual Property Protection in VLSI Design: Theory and Practice
Intellectual Property Protection in VLSI Design: Theory and Practice
The development and implementation of intellectual property (IP) protection mechanisms is of crucial importance for the emerging reuse-based system design methodology. Maybe even more importantly, it is such an elegant scientific and engineering challenge that it has drawn a lot of attention from academia and industry in recent years....
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The techniques discussed show readers how to perform their own evaluation of new and emerging security...
Ultrafast All-Optical Signal Processing Devices
Ultrafast All-Optical Signal Processing Devices

Semiconductor-based Ultra-Fast All-Optical Signal Processing Devices –a key technology for the next generation of ultrahigh bandwidth optical communication systems!

The introduction of ultra-fast communication systems based on all-optical signal processing is considered to be one of the most promising ways...

FPGA-based Implementation of Signal Processing Systems
FPGA-based Implementation of Signal Processing Systems

Field programmable gate arrays (FPGAs) are an increasingly popular technology for implementing digital signal processing (DSP) systems. By allowing designers to create circuit architectures developed for the specific applications, high levels of performance can be achieved for many DSP applications providing considerable improvements over...

Architecture of Italy (Reference Guides to National Architecture)
Architecture of Italy (Reference Guides to National Architecture)
Covering all regions of Italy--from Turin's Palace of Labor in northern Italy to the Monreale Cathedral and Cloister in Sicily--and all periods of Italian architecture--from the first-century Colosseum in Rome to the Casa Rustica apartments built in Milan in the 1930s--this volume examines over 70 of Italy's most important architectural landmarks....
System-level Test and Validation of Hardware/Software Systems (Springer Series in Advanced Microelectronics)
System-level Test and Validation of Hardware/Software Systems (Springer Series in Advanced Microelectronics)
New manufacturing technologies have made possible the integration of entire systems on a single chip. This new design paradigm, termed system-on-chip (SOC), together with its associated manufacturing problems, represents a real challenge for designers.

SOC is also reshaping approaches to test and validation activities. These are beginning to...

Physics And Modeling Of Tera- And Nano-Devices (Selected Topics in Eletronics and Systems)
Physics And Modeling Of Tera- And Nano-Devices (Selected Topics in Eletronics and Systems)
Physics and Modeling of Tera- and Nano-Devices is a compilation of papers by well-respected researchers working in the field of physics and modeling of novel electronic and optoelectronic devices. The topics covered include devices based on carbon nanotubes, generation and detection of terahertz radiation in semiconductor structures including...
Computer Systems, Second Edition
Computer Systems, Second Edition
Computer Systems, Second Edition provides students with a broad understanding of all levels of computer systems. It emphasizes computer science topics that are related to, but not usually included in, the treatment of hardware and its associated software. The topics are presented through a unified concept of computer systems. The book allows...
Chained Exploits: Advanced Hacking Attacks from Start to Finish
Chained Exploits: Advanced Hacking Attacks from Start to Finish
The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them

 

Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve...

Genetics and Genomics of Cotton (Plant Genetics and Genomics: Crops and Models)
Genetics and Genomics of Cotton (Plant Genetics and Genomics: Crops and Models)

A few members of the Gossypium (cotton) genus are cultivated for the production of elongated single-celled fibers valued worldwide at about $20 billion annually at the farm gate, and which sustain one of the world’s largest industries (textiles) with an annual worldwide economic impact of about $500 billion. In a number of ways, cotton...

Vulnerability Management
Vulnerability Management

As old as the threat of danger itself, vulnerability management (VM) has been the responsibility of leaders in every human organization, from tribes and fiefdoms right up through modern multinationals. Today, the focus of vulnerability management is still on infrastructure, but as knowledge is power and the lifeblood of any...

Introduction to Reconfigurable Supercomputing (Synthesis Lectures on Computer Architecture)
Introduction to Reconfigurable Supercomputing (Synthesis Lectures on Computer Architecture)

This book covers technologies, applications, tools, languages, procedures, advantages, and disadvantages of reconfigurable supercomputing using Field Programmable Gate Arrays (FPGAs). The target audience is the community of users of High Performance Computers (HPC) who may benefit from porting their applications into a reconfigurable...

Result Page: 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy