Große Auswahl an günstigen Büchern
Schnelle Lieferung per Post und DHL

Bücher veröffentlicht von Springer US

Filter
Filter
Ordnen nachSortieren Beliebt
  • 13% sparen
    von Carlos H. Diaz
    139,00 €

    Electrical overstress (EOS) and Electrostatic discharge (ESD) pose one of the most dominant threats to integrated circuits (ICs). These reliability concerns are becoming more serious with the downward scaling of device feature sizes. Modeling of Electrical Overstress in Integrated Circuits presents a comprehensive analysis of EOS/ESD-related failures in I/O protection devices in integrated circuits. The design of I/O protection circuits has been done in a hit-or-miss way due to the lack of systematic analysis tools and concrete design guidelines. In general, the development of on-chip protection structures is a lengthy expensive iterative process that involves tester design, fabrication, testing and redesign. When the technology is changed, the same process has to be repeated almost entirely. This can be attributed to the lack of efficient CAD tools capable of simulating the device behavior up to the onset of failure which is a 3-D electrothermal problem. For these reasons, it is important to develop and use an adequate measure of the EOS robustness of integrated circuits in order to address the on-chip EOS protection issue. Fundamental understanding of the physical phenomena leading to device failures under ESD/EOS events is needed for the development of device models and CAD tools that can efficiently describe the device behavior up to the onset of thermal failure. Modeling of Electrical Overstress in Integrated Circuits is for VLSI designers and reliability engineers, particularly those who are working on the development of EOS/ESD analysis tools. CAD engineers working on development of circuit level and device level electrothermal simulators will also benefit from the material covered. This book will also be of interest to researchers and first and second year graduate students working in semiconductor devices and IC reliability fields.

  • 14% sparen
    von Tommaso Bolognesi & Diego Latella
    185,00 €

  • von M. Bushnell
    123,00 €

    The modern electronic testing has a forty year history. Test professionals hold some fairly large conferences and numerous workshops, have a journal, and there are over one hundred books on testing. Still, a full course on testing is offered only at a few universities, mostly by professors who have a research interest in this area. Apparently, most professors would not have taken a course on electronic testing when they were students. Other than the computer engineering curriculum being too crowded, the major reason cited for the absence of a course on electronic testing is the lack of a suitable textbook. For VLSI the foundation was provided by semiconductor device techn- ogy, circuit design, and electronic testing. In a computer engineering curriculum, therefore, it is necessary that foundations should be taught before applications. The field of VLSI has expanded to systems-on-a-chip, which include digital, memory, and mixed-signalsubsystems. To our knowledge this is the first textbook to cover all three types of electronic circuits. We have written this textbook for an undergraduate "e;foundations"e; course on electronic testing. Obviously, it is too voluminous for a one-semester course and a teacher will have to select from the topics. We did not restrict such freedom because the selection may depend upon the individual expertise and interests. Besides, there is merit in having a larger book that will retain its usefulness for the owner even after the completion of the course. With equal tenacity, we address the needs of three other groups of readers.

  • 13% sparen
    von Melvin Scheinman
    139,00 - 140,00 €

  • von Jan Kåhre
    54,00 - 71,00 €

  • 13% sparen
    von Yuri P. Yatsenko & N. V. Hritonenko
    139,00 €

  • 13% sparen
    von Vincenzo Ancona
    140,00 €

  • von Amit P. Sheth & Naveen Ashish
    53,00 €

  • 14% sparen
    - IFIP TC8 / WG8.8 Fourth Working Conference on Smart Card Research and Advanced Applications September 20-22, 2000, Bristol, United Kingdom
    von Josep Domingo-Ferrer
    185,00 €

    Smart cards or IC cards offer a huge potential for information processing purposes. The portability and processing power of IC cards allow for highly secure conditional access and reliable distributed information processing. IC cards that can perform highly sophisticated cryptographic computations are already available. Their application in the financial services and telecom industries are well known. But the potential of IC cards go well beyond that. Their applicability in mainstream Information Technology and the Networked Economy is limited mainly by our imagination; the information processing power that can be gained by using IC cards remains as yet mostly untapped and is not well understood. Here lies a vast uncovered research area which we are only beginning to assess, and which will have a great impact on the eventual success of the technology. The research challenges range from electrical engineering on the hardware side to tailor-made cryptographic applications on the software side, and their synergies. This volume comprises the proceedings of the Fourth Working Conference on Smart Card Research and Advanced Applications (CARDIS 2000), which was sponsored by the International Federation for Information Processing (IFIP) and held at the Hewlett-Packard Labs in the United Kingdom in September 2000. CARDIS conferences are unique in that they bring together researchers who are active in all aspects of design of IC cards and related devices and environments, thus stimulating synergy between different research communities from both academia and industry. This volume presents the latest advances in smart card research and applications, and will be essential reading for smart card developers, smart card application developers, and computer science researchers involved in computer architecture, computer security, and cryptography.

  • 14% sparen
    von James P. G. Sterbenz & Joseph D. Touch
    185,00 €

  • 10% sparen
    von Burdette C. Breidenstein, Donald M. Kinsman & Anthony W. Kotula
    213,00 €

  • 14% sparen
    - Principles of method construction and tool support
    von Sjaak Brinkkemper
    185,00 €

  • 12% sparen
    von A. Fung, Ben-Zion Barta, David Teather & usw.
    94,00 €

  • 13% sparen
    von Harmen R. van As
    186,00 €

  • 14% sparen
    von Ralf Steinmetz, Jana Dittmann & Martin Steinebach
    185,00 €

  • 13% sparen
    von Gail Marshall & Mikko Ruohonen
    140,00 €

  • 12% sparen
    von George Kesidis
    94,00 €

    ATM Network Performance describes a unified approach to ATM network management. The focus is on satisfying quality-of-service requirements for individual B-ISDN connections. For an ATM network of output-buffer switches, the author describes how the basic network resources (switch buffer memory and link transmission bandwidth) should be allocated to achieve the required quality-of-service connections. The performance of proposed bandwidth scheduling policies is evaluated. Both single node and end-to-end performance results are given. In particular, these results are applied to resource provisioning problems for prerecorded (stored) video and video teleconferencing. The flow control problem for available bit rate traffic is also described. This book is intended for a one-term course in performance of Broadband Integrated-Services Digital Networks (B-ISDNs) based on a type of packet-switched communication network called Asynchronous Transfer Mode (ATM). The level of presentation is at the first year of graduate studies and for professionals working in the field, but it may be accessible to senior undergraduates as well. Some familiarity with ATM standards is assumed as such standards are only briefly outlined. All of the required background in discrete-time queueing theory is supplied. Exercises are given at the end of chapters. Solutions and/or hints to selected exercises are given in an Appendix.

  • 11% sparen
    von Cambyse Guy Omidyar
    95,00 €

  • 11% sparen
    von David L. Spooner & Martin S. Olivier
    95,00 €

  • 12% sparen
    - IFIP TC6 / WG6.7 Seventh International Conference on Intelligence in Networks (SmartNet 2002) April 8-10, 2002, Saariselka, Lapland, Finland
    von Olli Martikainen
    94,00 - 95,00 €

    Smart Networks comprises the proceedings of Smartnet'2002, the seventh conference on Intelligence in Networks, which was sponsored by the International Federation for Information Processing (IFIP) and organized by Working Group 6.7. It was held in Saariselka, Finland, in April 2002. The conference series closely reflects the developments in networking. Currently we are facing two conflicting trends: the increasing popularity of the Internet and the growth of mobile communications. The traditional Internet approach is to regard a network as a dummy pipe of bits and place all the intelligence in the end-devices. The traditional telecom approach is to regard the end-devices as dummy senders or receivers of bits and to put all the intelligence in the network. For fixed-line access to the Internet using a powerful PC, the Internet approach is plausible. However, for a nomadic user, who sometimes accesses services through a fixed-line Internet connection and, at other times, through a wireless connection using a restricted-capability access device, the situation becomes intolerable. Intelligence needs to be distributed and partially replicated in end-user devices, access networks, and the core network.The presentations in this volume consider these new trends and cover three major topics: platform software, services, and protocols. The sessions on platform software address various aspects of software infrastructure in networks including object-orientation, components, agents, and plug-and-play. The session on services includes interactive TV, group communication, and location awareness. The session on protocols discusses bandwidth brokers, authentication, and protocol testing.

  • 14% sparen
    von Vilas Wuwongse, Thongchai Yongchareon & Finn Arve Aagesen
    185,00 €

  • 13% sparen
    von Józef Wozniak & Jerzy Konorski
    139,00 €

  • 14% sparen
    von Scott F. Smith & Carolyn L. Talcott
    185,00 €

  • 12% sparen
    von Illah Reza Nourbakhsh
    94,00 €

    Interleaving Planning and Execution for Autonomous Robots develops a formal representation for interleaving planning and execution in the context of incomplete information. This work bridges the gap between theory and practice in robotics by presenting control architectures that are provably sound, complete and optimal, and then describing real-world implementations of these robot architectures. Dervish, winner of the 1994 AAAI National Robot Contest, is one of the robots featured. Interleaving Planning and Execution for Autonomous Robots is based on the author's PhD research, covering the same material taught in CS 224, the very popular Introduction to Robot Programming Laboratory taught at Stanford for four years by Professor Michael Genesereth and the author.

  • 14% sparen
    von Michael C. Fu & Jian-Qiang Hu
    185,00 €

  • 13% sparen
    von Dirk Hachenberger
    139,00 €

    Finite Fields are fundamental structures of Discrete Mathematics. They serve as basic data structures in pure disciplines like Finite Geometries and Combinatorics, and also have aroused much interest in applied disciplines like Coding Theory and Cryptography. A look at the topics of the proceed- ings volume of the Third International Conference on Finite Fields and Their Applications (Glasgow, 1995) (see [18]), or at the list of references in I. E. Shparlinski's book [47] (a recent extensive survey on the Theory of Finite Fields with particular emphasis on computational aspects), shows that the area of Finite Fields goes through a tremendous development. The central topic of the present text is the famous Normal Basis Theo- rem, a classical result from field theory, stating that in every finite dimen- sional Galois extension E over F there exists an element w whose conjugates under the Galois group of E over F form an F-basis of E (i. e. , a normal basis of E over F; w is called free in E over F). For finite fields, the Nor- mal Basis Theorem has first been proved by K. Hensel [19] in 1888. Since normal bases in finite fields in the last two decades have been proved to be very useful for doing arithmetic computations, at present, the algorithmic and explicit construction of (particular) such bases has become one of the major research topics in Finite Field Theory.

  • 14% sparen
    von B. Prabhakaran
    185,00 €

    Multimedia Database Management Systems presents the issues and the techniques used in building multimedia database management systems. Chapter 1 provides an overview of multimedia databases and underlines the new requirements for these applications. Chapter 2 discusses the techniques used for storing and retrieving multimedia objects. Chapter 3 presents the techniques used for generating metadata for various media objects. Chapter 4 examines the mechanisms used for storing the index information needed for accessing different media objects. Chapter 5 analyzes the approaches for modeling media objects, both their temporal and spatial characteristics. Object-oriented approach, with some additional features, has been widely used to model multimedia information. The book discusses two systems that use object-oriented models: OVID (Object Video Information Database) and Jasmine. The models for representing temporal and spatial requirements of media objects are then studied. The book also describes authoring techniques used for specifying temporal and spatial characteristics of multimedia databases. Chapter 6 explains different types of multimedia queries, the methodologies for processing them and the language features for describing them. The features offered by query languages such as SQL/MM (Structured Query Language for Multimedia), PICQUERY+, and Video SQL are also studied. Chapter 7 deals with the communication requirements for multimedia databases. A client accessing multimedia data over computer networks needs to identify a schedule for retrieving various media objects composing the database. The book identifies possible ways for generating a retrieval schedule. Chapter 8 ties together the techniques discussed in the previous chapters by providing a simple architecture of a distributed multimedia database management system. Multimedia Database Management Systems can be used as a text for graduate students and researchers working in the area of multimedia databases. In addition, the book serves as essential reading material for computer professionals who are in (or moving to) the area of multimedia databases.

  • 13% sparen
    von Thomas A. Mueck
    139,00 €

    Object-oriented database management systems (OODBMS) are used to imple- ment and maintain large object databases on persistent storage. Regardless whether the underlying database model follows the object-oriented, the rela- tional or the object-relational paradigm, a key feature of any DBMS product is content based access to data sets. On the one hand this feature provides user-friendly query interfaces based on predicates to describe the desired data. On the other hand it poses challenging questions regarding DBMS design and implementation as well as the application development process on top of the DBMS. The reason for the latter is that the actual query performance depends on a technically meaningful use of access support mechanisms. In particular, if chosen and applied properly, such a mechanism speeds up the execution of predicate based queries. In the object-oriented world, such queries may involve arbitrarily complex terms referring to inheritance hierarchies and aggregation paths. These features are attractive at the application level, however, they increase the complexity of appropriate access support mechanisms which are known to be technically non-trivial in the relational world.

  • 13% sparen
  • 13% sparen
    von Weidong Kou
    139,00 - 140,00 €

    Security is the science and technology of secure communications and resource protection from security violation such as unauthorized access and modification. Putting proper security in place gives us many advantages. It lets us exchange confidential information and keep it confidential. We can be sure that a piece of information received has not been changed. Nobody can deny sending or receiving a piece of information. We can control which piece of information can be accessed, and by whom. We can know when a piece of information was accessed, and by whom. Networks and databases are guarded against unauthorized access. We have seen the rapid development of the Internet and also increasing security requirements in information networks, databases, systems, and other information resources. This comprehensive book responds to increasing security needs in the marketplace, and covers networking security and standards. There are three types of readers who are interested in security: non-technical readers, general technical readers who do not implement security, and technical readers who actually implement security. This book serves all three by providing a comprehensive explanation of fundamental issues of networking security, concept and principle of security standards, and a description of some emerging security technologies. The approach is to answer the following questions: 1. What are common security problems and how can we address them? 2. What are the algorithms, standards, and technologies that can solve common security problems? 3.

Willkommen bei den Tales Buchfreunden und -freundinnen

Jetzt zum Newsletter anmelden und tolle Angebote und Anregungen für Ihre nächste Lektüre erhalten.