Home | Amazing | Today | Tags | Publishers | Years | Search 
Advanced Simulation and Test Methodologies for VLSI Design
Advanced Simulation and Test Methodologies for VLSI Design

With the advent of LSI and subsequently VLSI, technology has never witnessed such an unprecedented growth in the use of electronic systems in a wide range of applications. Although the ability to integrate several hundreds of thousands of transistors into a monolithic integrated circuit offers many advantages, a major concern in the...

IBM WebSphere Application Server v7.0 Security
IBM WebSphere Application Server v7.0 Security

IBM WebSphere Application Server Network Deployment is IBM's flagship J2EE application server platform. It implements the J2EE technology stack. This stack enables the WebSphere Application Server platform to execute the user's Java enterprise applications that perform business functions. There are several roles who use this platform...

Introduction to Cryptography with Coding Theory
Introduction to Cryptography with Coding Theory

This book is based on a course in cryptography at the upper level under graduate and beginning graduate level that has been given at the University of Maryland since 1997. When designing the course, we decided on the fol lowing requirements.

• The course should be up-to-date and cover a broad selection of topics from a...

Filtering, Segmentation and Depth (Lecture Notes in Computer Science)
Filtering, Segmentation and Depth (Lecture Notes in Computer Science)

Computer vision seeks a process that starts with a noisy, ambiguous signal from a TV camera and ends with a high-level description of discrete objects located in 3-dimensional space and identified in a human classification. In this book we address this process at several levels. We first treat the low-level image-processing issues of...

Concurrent Programming in Mac OS X and iOS: Unleash Multicore Performance with Grand Central Dispatch
Concurrent Programming in Mac OS X and iOS: Unleash Multicore Performance with Grand Central Dispatch

With the introduction of multicore devices such as the iPad 2 and the quad-core Mac- Book Pro, writing multithreaded apps that take advantage of multiple cores on a device has become one of the biggest headaches for developers. Take, for instance, the introduction of iPad 2. On the launch day, only a few applications, basically those...

Qualitative Representation of Spatial Knowledge (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)
Qualitative Representation of Spatial Knowledge (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)

Cognitive spatial concepts are qualitative in nature, i.e., they are based not so much on exact quantities but on comparisons between perceived magnitudes. We develop a qualitative model for the representation of spatial knowledge (in particular, of positional information about 2-dimensional projections) that is based only on locative...

Airplane Flight Dynamics and Automatic Flight Controls Pt. 1
Airplane Flight Dynamics and Automatic Flight Controls Pt. 1

In this two-part textbook, methods are presented for analysis and synthesis of the steady state and perturbed state (open and closed loop) stability and control of fixed wing aircraft. Part I contains Chapters 1-6 and Appendices A-D. Part П contains Chapters 7-12 as well as Appendix E.

The book is aimed at junior, senior...

Airplane Flight Dynamics and Automatic Flight Controls: Part 2
Airplane Flight Dynamics and Automatic Flight Controls: Part 2

In this two-part textbook, methods are presented for analysis and synthesis of the steady state and perturbed state (open and closed loop) stability and control of fixed wing aircraft. Part I contains Chapters 1-6 and Appendices A-D. Part II contains Chapters 7-12 as well as Appendix E.

The book is aimed at junior, senior and...

Algorithms in Bioinformatics
Algorithms in Bioinformatics

The present volume is dedicated to aspects of algorithmic work in bioinformat ics and computational biology with an emphasis on string algorithms that play a central role in the analysis of biological sequences. The papers included are a selection of articles corresponding to talks given at one of two meetings spon sored by The Royal...

Engineering Secure Software and Systems: Third International Symposium
Engineering Secure Software and Systems: Third International Symposium

It is our pleasure to welcome you to the third edition of the International Symposium on Engineering Secure Software and Systems.

This unique event aims at bringing together researchers from software engineering and security engineering, which might help to unite and further develop the two communities in this and future...

Electric Power Transformer Engineering, Second Edition
Electric Power Transformer Engineering, Second Edition

It is appropriate that I first acknowledge my appreciation to Professor Leo Grigsby for inviting me to prepare the chapter on power transformers for the first edition (2001) of his now very popular Electric Power Engineering Handbook. From this evolved the recognition that two chapters from the 2001 Handbook, those for (1) substations...

Database Systems: A Practical Approach to Design, Implementation, and Management (International Computer Science Series)
Database Systems: A Practical Approach to Design, Implementation, and Management (International Computer Science Series)

The history of database research over the past 30 years is one of exceptional productivity that has led to the database system becoming arguably the most impor tant development in the field of software engineering- The database is now the underlying framework of the information system, and has fundamentally changed the way many...

Result Page: 795 794 793 792 791 790 789 788 787 786 785 784 783 782 781 780 779 778 777 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy