|
2641.
|
Verilog and System Verilog gotchas : 101 common coding errors and how to avoid them
by Sutherland, Stuart | Mills, Don. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 621.392 SUT] (1).
|
|
2642.
|
Hardware verification with SystemVerilog : an object-oriented framework
by Mintz, Mike | Ekendahl, Robert. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 621.392 MIN] (1).
|
|
2643.
|
Introduction to network simulator NS2
by Issariyakul, Teerawat | Hossain, Ekram. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 004.6 ISS] (1).
|
|
2644.
|
Design and analysis of simulation experiments
by Kleijnen, Jack P. C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 511.8 KLE] (1).
|
|
2645.
|
Cryptographic engineering
by Koc, Cetin Kaya. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.82 KOC] (1).
|
|
2646.
|
Low power methodology manual for system-on-chip design
by Keating, Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 621.395 KEA] (1).
|
|
2647.
|
Secure integrated circuits and systems
by Verbauwhede, Ingrid. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 621.3815 VER] (1).
|
|
2648.
|
Smart cards, tokens, security and applications
by Mayes, Keith E | Markantonakis, Konstantinos. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 MAY] (1).
|
|
2649.
|
Embedded system design : topics, techniques and trends
by Rettberg, Achim. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 004.21 RET] (1).
|
|
2650.
|
New approaches for security, privacy and trust in complex environments
by Venter, Hein | IFIP TC11 International Information Security Conference. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005.8 VEN] (1).
|
|
2651.
|
From Gestalt theory to image analysis : a probabilistic approach
by Desolneux, Agnes | Moisan, Lionel | Morel, Jean-Michel. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 006.37 DES] (1).
|
|
2652.
|
Rapid prototyping of digital systems
by Hamblen, James O | Furman, Michael D | Hall, Tyson S. Edition: Sopc editionMaterial type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 621.395 HAM] (2).
|
|
2653.
|
Achievements in European research on grid systems
by Bubak, Marian | Gorlatch, Sergei | Priol, Thierry. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 004.36 GOR] (1).
|
|
2654.
|
Semantics-oriented natural language processing : mathematical models and algorithms
by Fomichov A. Vladimir. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 006.35 FOM] (2).
|
|
2655.
|
Advances in information processing and protection
by Pejas, Jerzy | Saeed, Khalid. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 006.33 PEJ] (1).
|
|
2656.
|
Trust Management
by Etalle, Sandro | Marsh, Stephen. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 005 ETA] (1).
|
|
2657.
|
Advances in Digital Forensics III.
by Shenoi, Sujeet | Craiger, Philip. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: No items available Checked out (1).
|
|
2658.
|
Network security
by Huang, Scott C | Du, Ding-Zhu | MacCallum, David. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.8 HUA] (1).
|
|
2659.
|
Recent advances in modeling and simulation tools for communication networks and services
by Bragg, Arnold | Ince, A. Nejat. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2007Availability: Items available for loan: [Call number: 621.382 INC] (1).
|
|
2660.
|
Vulnerability analysis and defense for the Internet
by Sing, Abhishek | Joseph, Hirosh | Singh, Baibhav. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 SIN] (1).
|