Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Functional Verification of Programmable Embedded Architectures: A Top-Down Approach
Functional Verification of Programmable Embedded Architectures: A Top-Down Approach
It is widely acknowledged that the cost of validation and testing comprises a significant
percentage of the overall development costs for electronic systems today,
and is expected to escalate sharply in the future. Many studies have shown that
up to 70% of the design development time and resources are spent on functional...
Creating Assertion-Based IP (Series on Integrated Circuits and Systems)
Creating Assertion-Based IP (Series on Integrated Circuits and Systems)
Assertion-based IP is much more than a comprehensive set of related assertions. It is a full-fledged reusable and configurable transaction-level verification component, which is used to detect both interesting and incorrect behaviors. Upon detecting interesting or incorrect behavior, the assertion-based IP alerts other verification components...
Software Requirements Using the Unified Process
Software Requirements Using the Unified Process

This book presents a systematic, easy-to-apply methodology for creating effective requirements. The authors present practical solutions for the full requirements lifecycle: gathering, analysis, specification, verification, and maintenance.

Working in the context of the Unified Process, they cover process...

Formal Methods: State of the Art and New Directions
Formal Methods: State of the Art and New Directions

The last decade has witnessed a modest but sustained increase in researching and applying formal methods. A number of well cited success stories are now available and provide strong evidence that formal methods can be effective and deployed in industrial-scale applications.

Through fundamental contributions from leading researchers, this...

The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The black hats have kept up with security enhancements. Have you?

In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution...

Problems on Algorithms
Problems on Algorithms
The ability to devise effective and efficient algorithms in new situations is a skill that separates the master programmer from the merely adequate coder. The best way to develop that skill is to solve problems. To be effective problem solvers, master-programmers-in-training must do more than memorize a collection of...
Aerodynamics of Wind Turbines
Aerodynamics of Wind Turbines

Aerodynamics of Wind Turbines is the established essential text for the fundamental solutions to efficient wind turbine design. Now in its second edition, it has been entirely updated and substantially extended to reflect advances in technology, research into rotor aerodynamics and the structural response of the wind turbine structure.
...

Modeling and Characterization of RF and Microwave Power FETs
Modeling and Characterization of RF and Microwave Power FETs

This is a book about the compact modeling of RF power FETs. In it, you will find descriptions of characterization and measurement techniques, analysis methods, and the simulator implementation, model verification and validation procedures that are needed to produce a transistor model that can be used with confidence by the circuit designer....

Advances in Biometrics: Third International Conferences, ICB 2009, Alghero, Italy, June 2-5, 2009, Proceedings
Advances in Biometrics: Third International Conferences, ICB 2009, Alghero, Italy, June 2-5, 2009, Proceedings

It is a pleasure and an honour both to organize ICB 2009, the 3rd IAPR/IEEE International Conference on Biometrics. This will be held 2–5 June in Alghero, Italy, hosted by the Computer Vision Laboratory, University of Sassari. The conference series is the premier forum for presenting research in biometrics and its allied technologies:...

xUnit Test Patterns: Refactoring Test Code (The Addison-Wesley Signature Series)
xUnit Test Patterns: Refactoring Test Code (The Addison-Wesley Signature Series)
Automated testing is a cornerstone of agile development. An effective testing strategy will deliver new functionality more aggressively, accelerate user feedback, and improve quality. However, for many developers, creating effective automated tests is a unique and unfamiliar challenge.

xUnit Test Patterns is the...

Networks and Grids: Technology and Theory (Information Technology: Transmission, Processing and Storage)
Networks and Grids: Technology and Theory (Information Technology: Transmission, Processing and Storage)
This textbook is intended for an undergraduate/graduate course on computer networks and for introductory courses dealing with performance evaluation of computers, networks, grids and telecommunication systems. Unlike other books on the subject, this text presents a balanced approach between technology and mathematical modeling. It covers networking...
Modelling Systems: Practical Tools and Techniques in Software Development
Modelling Systems: Practical Tools and Techniques in Software Development

For developers of computer-based systems, capturing and understanding the complex functional requirements and behaviour of software components has come to represent a considerable challenge. This book aims to equip readers with skills and techniques which will help them to address this challenge. It does so by stressing the value of...

unlimited object storage image
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy