 |
|
 Electronic System Level Design: An Open-Source Approach
Electronic System Level Design, or ESL Design, is generally understood as the set
of tools, methodologies and design techniques applied to modern electronic systems
design, from high-end chips and systems, to embedded devices, to integrated
hardware and software systems. Given the complexity of current systems, advanced
tools and... |  |  |  |  |
|
 Mathematical Foundations of Computer Science 2013: 38th International Symposium, MFCS 2013, Klosterneuburg, Austria, August 26-30, 2013, Proceedings
This book constitutes the thoroughly refereed conference proceedings of the 38th International Symposium on Mathematical Foundations of Computer Science, MFCS 2013, held in Klosterneuburg, Austria, in August 2013. The 67 revised full papers presented together with six invited talks were carefully selected from 191 submissions. Topics covered... |  |  Modern Cryptography Primer: Theoretical Foundations and Practical Applications
Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these... |  |  |
|
|
 Protocol Engineering
Communication protocols form the operational basis of computer networks and telecommunication systems. They are behavior conventions that describe how communication systems interact with each other, defining the temporal order of the interactions and the formats of the data units exchanged – essentially they determine the... |  |  Nursing Procedures (Springhouse, Nursing Procedures)
The newly revised Fourth Edition of this popular and widely used reference is a start-to-finish guide for nearly 400 basic and advanced nursing procedures. It provides step-by-step instructions for each procedure, explains how to use and troubleshoot equipment, and presents key information on rationales, cautions, complications,... |  |  Craniofacial Identification
The promotion of CCTV surveillance and identity cards, along with ever heightened security at airports, immigration control and institutional access, has seen a dramatic increase in the use of automated and manual recognition. In addition, several recent disasters have highlighted the problems and challenges associated with current disaster... |
|
| Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 |