Listing 1 - 10 of 247 | << page >> |
Sort by
|
Choose an application
This Symposium explores emerging trends and novel ideas and concepts in the area of VLSI. ISVLSI 2006 covers a range of topics: from VLSI circuits, systems, and design methods to system level design and system-on-chip issues, to bringing VLSI experience to new areas and technologies like nano- and molecular devices, MEMS, and quantum computing. Future design methodologies are one of the key topics at the workshop, as well as new CAD tools to support them.
Computers --- System design --- Circuits --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace
Choose an application
Integrated circuits --- Computers --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Very large scale integration --- Circuits
Choose an application
Hop Integrity in the Internet introduces a new security defense, hop integrity, that can be used against denial-of-service attacks in the Internet. Hop integrity ensures that if a message, that is part of a denial-of-service attack, is originated by an adversarial host in the Internet and if the message header includes a wrong address for the originating host (in order to hide the true source of the attack), then the message will be classified as modified or replayed and will be discarded by the first router that receives the message in the Internet. A suite of protocols for providing hop integrity in the Internet is discussed in great detail. In particular, each protocol in this suite is specified and verified using an abstract and formal notation, called the Secure Protocol Notation. There are five protocols in this suite: - A secure address resolution protocol - A light-weight key update protocol - A protocol for computing and verifying message digests - An anti-replay protocol that uses soft sequence numbers - An anti-replay protocol that uses hard sequence numbers In addition, other benefits of hop integrity extend to secure routing, mobile IP, and IP multicast. Hop Integrity in the Internet is primarily directed towards designers, reviewers, verifiers, and implementors of secure network protocols. Graduate students who are interested in network security and secure protocols will find this book invaluable.
Computer security. --- Computers. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
A collection of papers presented at the last Scientific Computing in Electrical Engineering (SCEE) Conference, held in Capo d'Orlando, Sicily, in 2004. The series of SCEE conferences aims at addressing mathematical problems which have a relevancy to industry. This book is useful for Engineers, Physicists and Mathematicians.
Electrical engineering --- Computers. --- Data processing --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Computer engineering. --- Computer science. --- Electrical Engineering. --- Computational Science and Engineering. --- Computers --- Informatics --- Science --- Design and construction --- Electrical engineering. --- Computer mathematics. --- Computer mathematics --- Electronic data processing --- Mathematics --- Electric engineering --- Engineering
Choose an application
Information science. --- Computers. --- Computer science --- High performance computing. --- HPC (Computer science) --- Electronic data processing --- Cyberinfrastructure --- Supercomputers --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Communication --- Information literacy --- Library science
Choose an application
Groovy Programming is an introduction to the Java-based scripting language Groovy. Groovy has much in common with popular scripting languages such as Perl, Python, and Ruby, but is written in a Java-like syntax. And, unlike these other languages, Groovy is sanctioned by the Java community for use on the Java platform. Since it is based on Java, applications written in Groovy can make full use of the Java Application Programmer Interfaces (APIs). This means Groovy can integrate seamlessly with applications written in Java, while avoiding the complexities of the full Java language. This b
Java (Computer program language) --- Computers. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Object-oriented programming languages --- JavaSpaces technology --- Information Technology --- General and Others
Choose an application
Mathematical Sciences --- Applied Mathematics --- communication --- computing --- control --- computational intelligence --- Computers --- Communication --- Computer science --- Mathematics --- Communication. --- Computer science. --- Computers. --- Mathematics. --- Math --- Science --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Informatics --- Communication, Primitive --- Mass communication --- Sociology --- Computer Science --- Computer. Automation
Choose an application
So your dream is to start your own business. But how do you know if it will work and how do you make it a reality? Start-up is a user guide for aspiring entrepreneurs and provides expert advice and guidance on every aspect of launching a new business. It will be of particular value if you are an academic wishing to exploit the commercial value of a new technology or business solution through the creation of a new company. Step-by-step, this inspiring and highly readable book covers how to evaluate the strength of your business idea, how to protect your invention, what legal steps and responsibilities are involved in forming a company, how to position your products in the market, how to create a business plan and raise finance. The case studies, practical exercises and tips in this book will help to demystify the process of starting a new business, give you the confidence to do it and greatly increase your chances of realising your dream.
New business enterprises --- Entrepreneurship. --- Management. --- Entrepreneur --- Intrapreneur --- Capitalism --- Business incubators --- Engineering. --- Computer industry. --- Marketing. --- Job Careers in Science and Engineering. --- The Computing Profession. --- Consumer goods --- Domestic marketing --- Retail marketing --- Retail trade --- Industrial management --- Aftermarkets --- Selling --- Administration --- Industrial relations --- Organization --- Electronic industries --- Construction --- Industrial arts --- Technology --- Marketing --- Engineering—Vocational guidance. --- Computers. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace
Choose an application
International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit www.springer.com. For more information about IFIP, please visit www.ifip.org.
Robots --- RDF (Document markup language) --- Queuing theory --- Recursion theory --- RDF (Langage de balisage) --- Files d'attente, Théorie des --- Théorie de la récursivité --- Programming --- Programmation --- Computer science -- Congresses. --- Computer science --- Engineering & Applied Sciences --- Computer Science --- Computer networks --- Artificial intelligence --- Computer science. --- Computers. --- Computer Science. --- Theory of Computation. --- Computer Science, general. --- Information theory. --- Informatics --- Science --- Communication theory --- Communication --- Cybernetics --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Machine theory --- Calculators --- Cyberspace
Choose an application
For the first time ever, the senior architect and lead developer for a key enterprise system on NASA's ongoing Mars Exploration Rover mission shares the secrets to one of the most difficult technology tasks of all-successful software developmentWritten in a conversational, brief, and to-the-point style, this book presents principles learned from the Mars Rover project that will help ensure the success of software developed for any enterprise systemAuthor Ronald Mak imparts anecdotes from his work on the Mars Rover and offers valuable lessons on software architecture, software e
Computers --- Business --- Roving vehicles (Astronautics) --- Exploration vehicles, Planetary --- Extraterrestrial roving vehicles --- Planetary exploration vehicles --- Rovers (Astronautics) --- Vehicles, Roving (Astronautics) --- Motor vehicles --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Design --- Data processing --- Automatic control --- Data processing. --- Mars Exploration Rover Mission (U.S.) --- United States. --- Mars (Planet) --- Red Planet --- Exploration --- ADP systems (Computer systems) --- Computing systems --- Systems, Computer --- Electronic systems --- Cyberinfrastructure --- Automatic control&delete& --- E-books
Listing 1 - 10 of 247 | << page >> |
Sort by
|