Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Agile Model-Based Development Using UML-RSDS
Agile Model-Based Development Using UML-RSDS

This book describes the concepts and application of model-based development (MBD), model transformations, and Agile MBD to a wide range of software systems. It covers systems requirements engineering, system specification and design, verification, reuse, and system composition in the context of Agile MBD. Examples of applications in...

The Calculus of Computation: Decision Procedures with Applications to Verification
The Calculus of Computation: Decision Procedures with Applications to Verification
Computational logic is a fast-growing field with applications in artificial intelligence, constraint solving, and the design and verification of software and hardware systems. Written with graduate and advanced undergraduate students in mind, this textbook introduces computational logic from the foundations of first-order logic to state-of-the-art...
Introduction to Process Algebra (Texts in Theoretical Computer Science. An EATCS Series)
Introduction to Process Algebra (Texts in Theoretical Computer Science. An EATCS Series)

Automated and semi-automated manipulation of so-called labelled transition systems has become an important means in discovering flaws in software and hardware systems. Process algebra has been developed to express such labelled transition systems algebraically, which enhances the ways of manipulation by means of equational logic and term...

Essential Issues in SOC Design: Designing Complex Systems-on-Chip
Essential Issues in SOC Design: Designing Complex Systems-on-Chip

This book originated from a workshop held at the DATE 2005 conference, namely Designing Complex SOCs. State-of-the-art in issues related to System-on-Chip (SoC) design by leading experts in the fields, covers IP development, verification, integration, chip implementation, testing and software.

SOC design is fast becoming the key...

Theories of Programming and Formal Methods: Essays Dedicated to Jifeng He on the Occasion of His 70th Birthday (Lecture Notes in Computer Science)
Theories of Programming and Formal Methods: Essays Dedicated to Jifeng He on the Occasion of His 70th Birthday (Lecture Notes in Computer Science)

This Festschrift volume, dedicated to He Jifeng on the occasion of his 70th birthday in September 2013, includes 24 refereed papers by leading researchers, current and former colleagues, who congratulated at a celebratory symposium held in Shanghai, China, in the course of the 10th International Colloquium on Theoretical Aspects of Computing,...

Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

Programming Logics: Essays in Memory of Harald Ganzinger (Lecture Notes in Computer Science)
Programming Logics: Essays in Memory of Harald Ganzinger (Lecture Notes in Computer Science)

This Festschrift volume, published in memory of Harald Ganzinger, contains 17 papers from colleagues all over the world and covers all the fields to which Harald Ganzinger dedicated his work during his academic career. The volume begins with a complete account of Harald Ganzinger's work and then turns its focus to the research of his...

Protocol Engineering
Protocol Engineering

Communication protocols form the operational basis of computer networks and tele­communication systems. They are behavior conventions that describe how com­munication systems inter­act with each other, defining the temporal order of the interactions and the formats of the data units exchanged – essentially they determine the...

Software Configuration Management
Software Configuration Management

An effective systems development and design process is far easier to explain than it is to implement. A framework is needed that organizes the life cycle activities that form the process. This framework is Configuration Management (CM).

Software Configuration Management discusses the framework from a standards viewpoint, using...

PCI Express System Architecture
PCI Express System Architecture

PCI Express is the third-generation Peripheral Component Inter-connect technology for a wide range of systems and peripheral devices. Incorporating recent advances in high-speed, point-to-point interconnects, PCI Express provides significantly higher performance, reliability, and enhanced capabilities—at a lower...

Formal Methods: Industrial Use from Model to the Code
Formal Methods: Industrial Use from Model to the Code

Although formal analysis programming techniques may be quite old, the introduction of formal methods only dates from the 1980s. These techniques enable us to analyze the behavior of a software application, described in a programming language. It took until the end of the 1990s before formal methods or the B method could be implemented in...

Practical Formal Software Engineering: Wanting the Software You Get
Practical Formal Software Engineering: Wanting the Software You Get
Practical Formal Software Engineering is a textbook aimed at final year undergraduate and graduate students, emphasizing formal methods in writing robust code quickly. Engineering is an informal process using formal logics as tools and components to obtain timely practical solutions. This book takes an engineering approach to illuminate the...
Result Page: 26 25 24 23 22 21 20 19 18 17 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy