Agile Model-Based Development Using UML-RSDS
This book describes the concepts and application of model-based development (MBD), model transformations, and Agile MBD to a wide range of software systems. It covers systems requirements engineering, system specification and design, verification, reuse, and system composition in the context of Agile MBD. Examples of applications in...
Hardware Verification with C++: A Practitioners Handbook
There are several books about hardware verification, so what makes
this handbook different? Put simply, this handbook is meant to be useful
in your day-to-day work. The authors are like you, cube dwellers, with
battle scars from developing chips. We must cope with impossible schedules,
a shortage of people to do...
Microsoft Visio 2013 Business Process Diagramming and Validation
Using Microsoft Visio to visualize business information is a huge aid to comprehension and clarity. Learn how with this practical guide to process diagramming and validation, written as a practical tutorial with sample code and demos.
Optimize your business information visualization by mastering...
Handbook of Software Quality Assurance The industry's top guide to software quality -- completely updated!
Practical techniques for mission-critical and commercial software.
Build a great software quality organization.
Prepare for ASQ Software Quality Engineer Certification.
Software quality assurance has never been more challenging -- nor more...
CONCUR 2004 -- Concurrency Theory
This book constitutes the refereed proceedings of the 15th International Conference on Concurrency Theory, CONCUR 2004, held in London, UK in August/September 2004.
The 29 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 134 submissions. Among the topics covered are concurrency...
Modern Cryptography Primer: Theoretical Foundations and Practical Applications
Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these...
Co-verification of Hardware and Software for ARM SoC Design (Embedded Technology) This book is the first to document and teach important information about the verification technique known as hardware/software co-verification. Traditional embedded system design has evolved into single chip designs that are pushing past 1M logic gates and headed toward 10M gates. In this era of SoC design, chips now include microprocessors and...
|Result Page: 26 25 24 23 22 21 20 19 18 17 |