2641. Verilog and System Verilog gotchas : 101 common coding errors and how to avoid them

by Sutherland, Stuart | Mills, Don.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 621.392 SUT] (1).
2642. Hardware verification with SystemVerilog : an object-oriented framework

by Mintz, Mike | Ekendahl, Robert.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 621.392 MIN] (1).
2643. Introduction to network simulator NS2

by Issariyakul, Teerawat | Hossain, Ekram.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 004.6 ISS] (1).
2644. Design and analysis of simulation experiments

by Kleijnen, Jack P. C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 511.8 KLE] (1).
2645. Cryptographic engineering

by Koc, Cetin Kaya.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.82 KOC] (1).
2646. Low power methodology manual for system-on-chip design

by Keating, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 621.395 KEA] (1).
2647. Secure integrated circuits and systems

by Verbauwhede, Ingrid.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 621.3815 VER] (1).
2648. Smart cards, tokens, security and applications

by Mayes, Keith E | Markantonakis, Konstantinos.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 MAY] (1).
2649. Embedded system design : topics, techniques and trends

by Rettberg, Achim.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 004.21 RET] (1).
2650. New approaches for security, privacy and trust in complex environments

by Venter, Hein | IFIP TC11 International Information Security Conference.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 VEN] (1).
2651. From Gestalt theory to image analysis : a probabilistic approach

by Desolneux, Agnes | Moisan, Lionel | Morel, Jean-Michel.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 006.37 DES] (1).
2652. Rapid prototyping of digital systems

by Hamblen, James O | Furman, Michael D | Hall, Tyson S.

Edition: Sopc editionMaterial type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 621.395 HAM] (2).
2653. Achievements in European research on grid systems

by Bubak, Marian | Gorlatch, Sergei | Priol, Thierry.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 004.36 GOR] (1).
2654. Semantics-oriented natural language processing : mathematical models and algorithms

by Fomichov A. Vladimir.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 006.35 FOM] (2).
2655. Advances in information processing and protection

by Pejas, Jerzy | Saeed, Khalid.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 006.33 PEJ] (1).
2656. Trust Management

by Etalle, Sandro | Marsh, Stephen.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005 ETA] (1).
2657. Advances in Digital Forensics III.

by Shenoi, Sujeet | Craiger, Philip.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: No items available Checked out (1).
2658. Network security

by Huang, Scott C | Du, Ding-Zhu | MacCallum, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 HUA] (1).
2659. Recent advances in modeling and simulation tools for communication networks and services

by Bragg, Arnold | Ince, A. Nejat.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 621.382 INC] (1).
2660. Vulnerability analysis and defense for the Internet

by Sing, Abhishek | Joseph, Hirosh | Singh, Baibhav.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 SIN] (1).

Powered by Koha