You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This volume is the proceedings of a workshop organized by General Motors research and development laboratory in Bangalore, India. It was the first of its kind to be run by an automotive major to bring together the leaders in the field of embedded systems development to present state-of-the-art work, and to discuss future strategies for addressing the increasing complexity of embedded control systems. The workshop consisted of invited talks given by leading experts and researchers from academic and industrial organizations. It covered all areas of embedded systems development.
This book constitutes the refereed proceedings of the 18th Conference on Foundations of Software Technology and Theoretical Computer Science, FSTTCS'98, held in Chennai, India, in December 1998. The 28 revised full papers presented were carefully selected from a total of 93 submissions; also included are six invited contributions. The papers deal with theoretical topics ranging from discrete mathematics and algorithmic aspects to software engineering, program semantics and mathematical logic.
This book constitutes the refereed proceedings of the 4th International Conference on Applied Cryptography and Network Security, ACNS 2006, held in Singapore in June 2006. Book presents 33 revised full papers, organized in topical sections on intrusion detection and avoidance, cryptographic applications, DoS attacks and countermeasures, key management, cryptanalysis, security of limited devices, cryptography, authentication and Web security, ad-hoc and sensor network security, cryptographic constructions, and security and privacy.
This book constitutes the refereed proceedings of the 13th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2007, held in Braga, Portugal. Coverage includes software verification, probabilistic model checking and markov chains, automata-based model checking, security, software and hardware verification, decision procedures and theorem provers, as well as infinite-state systems.
The Boundary Element Method, or BEM, is a powerful numerical analysis tool with particular advantages over other analytical methods. With research in this area increasing rapidly and more uses for the method appearing, this timely book provides a full chronological review of all techniques that have been proposed so far, covering not only the fundamentals of the BEM but also a wealth of information on related computational analysis techniques and formulations, and their applications in engineering, physics and mathematics. An indispensable handbook and source of inspiration for researchers and professionals in these fields, this book is also an ideal textbook for graduate engineering students.
This book constitutes the refereed proceedings of the 7th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2001. The 36 revised full papers presented together with an invited contribution were carefully reviewed and selected from a total of 125 submissions. The papers are organized in sections on symbolic verification, infinite state systems - deduction and abstraction, application of model checking techniques, timed and probabilistic systems, hardware - design and verification, software verification, testing - techniques and tools, implementation techniques, semantics and compositional verification, logics and model checking, and ETAPS tool demonstration.
Theoretical Aspects of Chemical Reactivity provides a broad overview of recent theoretical and computational advancements in the field of chemical reactivity. Contributions have been made by a number of leaders in the field covering theoretical developments to applications in molecular systems and clusters. With an increase in the use of reactivity descriptors, and fundamental theoretical aspects becoming more challenging, this volume serves as an interesting overview where traditional concepts are revisited and explored from new viewpoints, and new varieties of reactivity descriptors are proposed. Includes applications in the frontiers of reactivity principles, and introduces dynamic and statistical viewpoints to chemical reactivity and challenging traditional concepts such as aromaticity. * Written by specialists in the field of chemical reactivity* An authoritative overview of the research and progress * An essential reference material for students
Describes several useful paradigms for the design and implementation of efficient external memory (EM) algorithms and data structures. The problem domains considered include sorting, permuting, FFT, scientific computing, computational geometry, graphs, databases, geographic information systems, and text and string processing.
Optical Methods of Measurement: Wholefield Techniques, Second Edition provides a comprehensive collection of wholefield optical measurement techniques for engineering applications. Along with the reorganization of contents, this edition includes a new chapter on optical interference, new material on nondiffracting and singular beams and their applications, and updated bibliography and additional reading sections. The book explores the propagation of laser beams, metrological applications of phase-singular beams, various detectors such as CCD and CMOS devices, and recording materials. It also covers interference, diffraction, and digital fringe pattern measurement techniques, with special emp...
This book covers the hot topics of angiosperm structure and evolution in several chapters discussing vegetative and reproductive characters. It also looks at the implications of ancestral angiosperm characters for an herbaceous origin and the phylogeny of angiosperms from a structure and molecular perspective.