Wireless Communications, Networking and A...
36,464円 This book is based on a series of conferences on Wireless Communications, Networking and Applications that have been held on December 27-28, 2014 in Shenzhen, China. The meetings themselves were a response to technological developments in the areas of wireless communications, networking and appli...
Detecting Peripheral-based Attacks on the...
11,358円 This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripheral...
Resilient Computer System Design
11,358円 This book presents a paradigm for designing new generation resilient and evolving computer systems, including their key concepts, elements of supportive theory, methods of analysis and synthesis of ICT with new properties of evolving functioning, as well as implementation schemes and their protot...
Media Access Control and Resource Allocation
6,076円 This book focuses on various Passive optical networks (PONs) types, including currently deployed Ethernet PON (EPON) and Gigabit PON (GPON) as well as next generation WDM PON and OFDM PON. Also this book examines the integrated optical and wireless access networks. Concentrating on two issues in ...
Future Information Technology, Applicatio...
24,309円 This book is proceedings of the 7th FTRA International Conference on Future Information Technology (FutureTech 2012). The topics of FutureTech 2012 cover the current hot topics satisfying the world-wide ever-changing needs. The FutureTech 2012 is intended to foster the dissemination of state-of-t...
Dependability of Networked Computer-based...
18,231円 The measurement of dependability attributes on real systems is a very time-consuming and costly affair, making analytical or simulation modeling the only viable solutions. Dependability of Networked Computer-based Systems explores reliability, availability and safety modeling of networked compute...
SystemVerilog for Verification
7,900円 Based on the highly successful second edition, this extended edition of SystemVerilog for Verification: A Guide to Learning the Testbench Language Features teaches all verification features of the SystemVerilog language, providing hundreds of examples to clearly explain the concepts and basic fun...
High Speed VCSELs for Optical Interconnects
12,154円 The transmission speed of data communication systems is forecast to increase exponentially over the next decade. Development of both Si-based high-speed drivers as well as III-V-semiconductor-based high-speed vertical cavity surface emitting lasers (VCSELs) are prerequisites for future ultrahigh ...
Atomic Layer Deposition for Semiconductors
19,447円 This edited volume discusses atomic layer deposition (ALD) for all modern semiconductor devices, moving from the basic chemistry of ALD and modeling of ALD processes to sections on ALD for memories, logic devices, and machines. The section on ALD for memories covers both mass-produced memories, s...
Towards a Theoretical Neuroscience: from ...
18,231円 The book explains how to understand cognition in terms of brain anatomy, physiology and chemistry, using an approach adapted from techniques for understanding complex electronic systems. These techniques create hierarchies of information process based descriptions on different levels of detail, w...
Memory Controllers for Real-Time Embedded...
12,154円 Verification of real-time requirements in systems-on-chip becomes more complex as more applications are integrated. Predictable and composable systems can manage the increasing complexity using formal verification and simulation. This book explains the concepts of predictability and composability...
Polynomial Theory of Error Correcting Codes
18,231円 The book offers an original view on channel coding, based on a unitary approach to block and convolutional codes for error correction. It presents both new concepts and new families of codes. For example, lengthened and modified lengthened cyclic codes are introduced as a bridge towards time-inva...
楽天Koboの電子書籍!マンガ、小説、雑誌のレビュー高評価、最安値をチャック!