Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Design Automation Techniques for Approximation Circuits: Verification, Synthesis and Test
Design Automation Techniques for Approximation Circuits: Verification, Synthesis and Test

This book describes reliable and efficient design automation techniques for the design and implementation of an approximate computing system. The authors address the important facets of approximate computing hardware design - from formal verification and error guarantees to synthesis and test of approximation systems. They provide...

Bayesian Networks and Influence Diagrams: A Guide to Construction and Analysis (Information Science and Statistics)
Bayesian Networks and Influence Diagrams: A Guide to Construction and Analysis (Information Science and Statistics)
Probabilistic networks, also known as Bayesian networks and influence diagrams, have become one of the most promising technologies in the area of applied artificial intelligence, offering intuitive, efficient, and reliable methods for diagnosis, prediction, decision making, classification, troubleshooting, and data mining under uncertainty....
Integrated Formal Methods: 4th International Conference, IFM 2004, Canterbury
Integrated Formal Methods: 4th International Conference, IFM 2004, Canterbury
The fourth conference in the series of international meetings on Integrated Formal Methods, IFM, was held in Canterbury, UK, 4–7 April 2004. The conference was organized by the Computing Laboratory at the University of Kent, whose main campus is just outside the ancient town of Canterbury, part of the county of Kent.

Kent is
...
Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

Software Reliability Methods (Texts in Computer Science)
Software Reliability Methods (Texts in Computer Science)

This book presents current methods for dealing with software reliability, illustrating the advantages and disadvantages of each method. The description of the techniques is intended for a non-expert audience with some minimal technical background. It also describes some advanced techniques, aimed at researchers and practitioners in software...

Software Verification and Analysis: An Integrated, Hands-On Approach
Software Verification and Analysis: An Integrated, Hands-On Approach
This book addresses the most important techniques in improving the correctness of software, including correctness by construction (top-down refinement), program proving, static analysis and dynamic, execution-based analysis (testing and debugging).

Three major software verification techniques are discussed: Semantic program synthesis and...

Fundamental Approaches to Software Engineering: 14th International Conference, FASE 2011
Fundamental Approaches to Software Engineering: 14th International Conference, FASE 2011

FASE (Fundamental Approaches to Software Engineering) is concerned with the foundations on which software engineering is built. Its focus is on novel techniques and the way in which they contribute to making software engineering a more mature and soundly based discipline. This year, we particularly encouraged contributions that combine the...

Cryptographic Security Architecture: Design and Verification
Cryptographic Security Architecture: Design and Verification
This book describes various aspects of cryptographic security architecture design, with a
particular emphasis on the use of rigorous security models and practices in the design. The
first portion of the book presents the overall architectural basis for the design, providing a
general overview of features such as the object model and
...
Verification and Validation in Systems Engineering: Assessing UML/SysML Design Models
Verification and Validation in Systems Engineering: Assessing UML/SysML Design Models

Verification and validation represents an important process used for the quality assessment of engineered systems and their compliance with the requirements established at the beginning of or during the development cycle.

Debbabi and his coauthors investigate methodologies and techniques that can be employed for the automatic...

HVAC Fundamentals
HVAC Fundamentals
HVAC Fundamentals covers the full range of HVAC systems used in today’s facilities. This is a comprehensive book providing the reader a detailed description of how HVAC systems operate. The HVAC systems are divided into components and controls for air, water, heating, ventilating and air conditioning to clearly illustrate the way in which...
Embedded Systems Handbook (Industrial Information Technology)
Embedded Systems Handbook (Industrial Information Technology)
The purpose of the Embedded Systems Handbook is to provide a reference useful to a broad range of professionals and researchers from industry and academia involved in the evolution of concepts and technologies, as well as development and use of embedded systems and related technologies.

The book provides a comprehensive overview of the
...
Fundamental Concepts in Computer Science (Advances in Computer Science and Engineering: Texts)
Fundamental Concepts in Computer Science (Advances in Computer Science and Engineering: Texts)

Computer Science, or Informatics as it is often called in Europe, is viewed by many as being both a science and a technology. Clearly, its technological aspects are very much upon us on a day to day basis. Yet all other exact  sciences such as physics, biology or chemistry are also very present in ourdaily lives through the technologies...

unlimited object storage image
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy