You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
A multidisciplinary approach to research studies fo sedimentary rocks and their constituents and the evolution of sedimentary basins--both ancient and modern.
Semantic Web technologies enable people to create data stores on the Web, build vocabularies, and write rules for handling data. They have been in use for several years now, and knowledge extraction and knowledge discovery are two key aspects investigated in a number of research fields which can potentially benefit from the application of semantic web technologies, and specifically from the development and reuse of ontologies. This book, Applications and Practices in Ontology Design, Extraction, and Reasoning, has as its main goal the provision of an overview of application fields for semantic web technologies. In particular, it investigates how state-of-the-art formal languages, models, met...
This issue of ECS Transactions on Semiconductor Wafer Bonding will cover the state-of-the-art R&D results of the last 2 years in the field of semiconductor wafer bonding technology. Wafer Bonding is an Enabling Technology that can be used to create novel composite materials systems and devices that would otherwise be unattainable. Wafer Bonding today is rapidly expanding into new applications in such diverse fields as photonics, sensors, MEMS. X-ray optics, non-electronic microstructures, high performance CMOS platforms for high end servers, Si-Ge, strained SOI, Germanium-on-Insulator (GeOI) and Nanotechnologies.
This book constitutes the refereed proceedings of the 7th International Joint Conference on Automated Reasoning, IJCAR 2014, held as part of the Vienna Summer of Logic, VSL 2014, in Vienna, Austria, in July 2014. IJCAR 2014 was a merger of three leading events in automated reasoning, namely CADE (International Conference on Automated Deduction), FroCoS (International Symposium on Frontiers of Combining Systems) and TABLEAUX (International Conference on Automated Reasoning with Analytic Tableaux and Related Methods). The 26 revised full research papers and 11 system descriptions presented together with 3 invited talks were carefully reviewed and selected from 83 submissions. The papers have been organized in topical sections on HOL, SAT and QBF, SMT, equational reasoning, verification, proof theory, modal and temporal reasoning, SMT and SAT, modal logic, complexity, description logics and knowledge representation and reasoning.
A subtle change that leads to disastrous consequences—hardware Trojans undoubtedly pose one of the greatest security threats to the modern age. How to protect hardware against these malicious modifications? One potential solution hides within logic locking; a prominent hardware obfuscation technique. In this book, we take a step-by-step approach to understanding logic locking, from its fundamental mechanics, over the implementation in software, down to an in-depth analysis of security properties in the age of machine learning. This book can be used as a reference for beginners and experts alike who wish to dive into the world of logic locking, thereby having a holistic view of the entire infrastructure required to design, evaluate, and deploy modern locking policies.