Home | Amazing | Today | Tags | Publishers | Years | Search 
CMOS IC Layout: Concepts, Methodologies, and Tools
CMOS IC Layout: Concepts, Methodologies, and Tools
Once upon a time, around about 1988, after finishing a very stressful but successful project within Motorola Semiconductor Israel (MSIL), the entire team was invited to a special lunch. Everybody was happy that we finished the “project” ahead of time, and we were there to enjoy the victory of “tape-out.”...
Design of Analog Cmos Integrated Cir
Design of Analog Cmos Integrated Cir
In the past two decades, CMOS technology has rapidly embraced the field of analog inte- grated circuits, providing low-cost, high-performance solutions and rising to dominate the market. While silicon bipolar and III-V devices still find niche applications, only CMOS processes have emerged as a viable choice for the integration of...
Handbook of Security and Networks
Handbook of Security and Networks
As computing and networking technologies are gradually integrated with every aspect of human lives and activities, computer and network security has become a critical issue. The Handbook of Security and Networks presents a collection of recent advances in computer networking and security areas. These include applied...
Theory and Practice of Algorithms in (Computer) Systems: First International ICST Conference, TAPAS 2011, Rome, Italy
Theory and Practice of Algorithms in (Computer) Systems: First International ICST Conference, TAPAS 2011, Rome, Italy
This volume contains the 25 papers presented at the First International ICST Conference on Theory and Practice of Algorithms in (Computer) Systems (TAPAS 2011), held in Rome during April 18-20 2011, including three papers by the distinguished invited speakers Shay Kutten, Kirk Pruhs and Paolo Santi.

In light of
...
Computer Vision Systems: 8th International Conference, ICVS 2011, Sophia Antipolis, France, September 20-22, 2011, Proceedings
Computer Vision Systems: 8th International Conference, ICVS 2011, Sophia Antipolis, France, September 20-22, 2011, Proceedings
Computer Vision is the science and technology of machines that see. The dominant scientific conferences in computer vision, such as ICCV, CVPR and ECCV, concentrate on theories and models for obtaining information from images and image sequences. The intensely competitive nature of these conferences leaves little room to...
Adaptive Control Approach for Software Quality Improvement (Series on Software Engineering & Knowledge Engineering)
Adaptive Control Approach for Software Quality Improvement (Series on Software Engineering & Knowledge Engineering)
The expansion of our reliance on software in many aspects of modern society has coincided with a number of incidents in aeronautics, astronautics, transportation, medical devices, energy generation, banking and finance. Failures caused by software have introduced more than just inconvenience, but significant property damage,...
EVE Online: ISK Strategy Guide
EVE Online: ISK Strategy Guide
EVE Online is a popular sci-fi MMORPG with the reputation of being one of, if not the most complex and unforgiving MMO on the market. There are many players with years of experience playing EVE without ever fully understanding the game or achieving any kind of notable success.

This book differs from all the other written
...
Dart: Up and Running
Dart: Up and Running
When we joined Google and entered the fascinating world of web browser development more than six years ago, the web was a different place. It was clear that a new breed of web apps was emerging, but the performance of the underlying platform left much to be desired. Given our background in designing and implementing...
Digital Privacy: PRIME - Privacy and Identity Management for Europe
Digital Privacy: PRIME - Privacy and Identity Management for Europe
Information technologies are becoming pervasive and powerful to the point that the privacy of citizens is now at risk. Indeed, more and more of our daily transactions are conducted electronically and require us to transmit personal information. Examples include using an electronic identity card to prove one’s age in a...
Mechatronic Systems: Analysis, Design and Implementation
Mechatronic Systems: Analysis, Design and Implementation
Nowadays most of the systems are computer controlled among them we quote mechatronic systems where the intelligence is implemented in microcontrollers. The discipline that deals with such systems is mechatronics that we define as the synergistic combination of mechanical engineering, electronic engineering, and software...
Pro HTML5 with Visual Studio 2012
Pro HTML5 with Visual Studio 2012
HTML5 is such an exciting opportunity for software developers. For a long time, the web has been the favorite platform for providing software applications to both external and internal users because of its reach and ease of deployment and maintenance. The primary limitation has been the client-side support, which can severely limit...
Handbook of Software Engineering and Knowledge Engineering, Vol 2 Emerging Technologies
Handbook of Software Engineering and Knowledge Engineering, Vol 2 Emerging Technologies
The Handbook of Software Engineering and Knowledge Engineering is the first comprehensive handbook covering these two important areas that have become interwoven in recent years. Many international experts contribute to this Handbook. Each article is written in a way that a practitioner of software engineering and knowledge...
Result Page: 2099 2098 2097 2096 2095 2094 2093 2092 2091 2090 2089 2088 2087 2086 2085 2084 2083 2082 2081 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy