Search Results - "Computer architecture and logic design"
-
1
Authors: et al.
Subject Terms: Clifford algebra, mathematical physics applications, data analysis, neural network theory, quaternion, fuzzy logic systems, Cayley-Dickson, image processing techniques, hypercomplex-valued, time series modeling, complex-valued, computational mechanics, advanced neural network architectures, Neural networks and fuzzy systems, Mathematical theory of computation, Computer architecture and logic design, Algebra, Automatic control engineering, Applied mathematics, Probability and statistics
File Description: application/pdf
-
2
Contributors:
Subject Terms: formal methods, computer-aided system design, hardware and system verification, formal verification, specification, synthesis and testing, automated and formal reasoning, Systems analysis and design, Software testing and verification, Computer architecture and logic design, Mathematical theory of computation, Artificial intelligence
File Description: application/pdf
Relation: Conference Series: Formal Methods in Computer-Aided Design
-
3
Contributors:
Subject Terms: energy management, renewable energy, Smart IoT, Sustainable Development Goals (SDG), Sustainable cities and communities, Artificial intelligence, Computer architecture and logic design, Information technology: general topics, Computer networking and communications, Computer security, Real time operating systems, Software Engineering, Supercomputers, Automatic control engineering
File Description: application/pdf
-
4
Authors: Ujwary-Gil, Anna
Subject Terms: Organizational Network Analysis, strategic management, Business Process, meta-model, Intangible Resources, organizational intangible resources audit, Intra-organizational Knowledge Transfer, network analysis, Network Level Results, Dependent Variable Matrix, Dynamic Network Analysis, Standard Social Network, Knowledge Based View, Knowledge Audit, Organizational Knowledge Resources, Intellectual Capital Statement, Information Audit, Audit Model, Vice Versa, Eigenvector Centrality, Marked 1, Task Networks, Organizational theory and behaviour, Business strategy, Research and development management, Production and quality control management, Knowledge management, International business, Business mathematics and systems, Computer networking and communications, Computer architecture and logic design, Politics and government
File Description: application/pdf
Relation: Routledge Studies in Business Organizations and Networks
-
5
Authors: Noto La Diega, Guido
Subject Terms: M2M, RFID, The Internet of Things, Contracting, consumer protection, Product liability, concept of product, Faulty products, Netflix Law, online content services, data protection, privacy, cybersecurity, Liability, transparency, data portability, non-personal data, jurisdiction, Cyber-risks, insurance, tortious liability, Composite Things, negligence, things of danger, liability allocation, foreseeability, intellectual property rights, Patenting, computer-implemented inventions, Trade secrets, Contract law, Data protection law, Intellectual property law, Computer security, Computer architecture and logic design
File Description: application/pdf
Relation: Routledge Research in the Law of Emerging Technologies
-
6
Contributors:
Subject Terms: Chinese Social Sciences Citation Index, SKOS Concept, Latent Dirichlet Allocation, UGC Hub, RDF Data, Digital Humanities, DH Research, Cultural Heritage Data, Data Models, Semantic Enrichment, Ead, CRM, Web Ontology Language, Digital Humanities Projects, LOD, Linked Data Principle, Cultural Heritage Sector, EDM, Metadata Aggregation, Item Level Description, SKOS, CPF, Semantic Web, HathiTrust Digital Library, Intangible Cultural Heritage, Library and information sciences / Museology, Cultural studies, Museology and heritage studies, Information technology: general topics, Computer networking and communications, Databases, Semantics, discourse analysis, stylistics, Artificial intelligence, Computer architecture and logic design, History
File Description: application/pdf
Relation: Digital Research in the Arts and Humanities
-
7
Authors:
Subject Terms: decision-making skills, rational decisions, structuring decision information, Bayesian Decision Analysis, Guidelines for Real-Life Decisions, Decison Theory, Miscellanea Analytica, Nicolaus Bernoulli, Real World Methods, Imprecise Probability, Pilot Method, Decision Situation, Descriptive Decision Theory, Sub-criteria Level, Laplace's Rule, Petersburg Paradox, Multi-criteria Decision, Real Life Decision, AHP Method, Chance Nodes, Current Decision Situation, Smart, Pairwise Ratios, Level L4, Energy Policy, Probability and statistics, Digital and information technologies: social and ethical aspects, Artificial intelligence, Digital and information technologies: Legal aspects, Internet guides and online services, Computer architecture and logic design, Computer networking and communications, Engineering: general, Ergonomics
File Description: application/pdf
-
8
Contributors:
Subject Terms: Ad Hoc Networks, Routing Protocol, mobile ad hoc networks, OLSR Protocol, MANET, Wireless Mesh Network, ad-hoc, protocols, Ad Hoc Routing, routing protocols, QoS Routing, networks, Mobile Nodes, Cluster Heads, Proactive Routing Protocol, OLSR, MANET Routing Protocol, Reactive Routing Protocol, MANET Routing, MR, Mac Layer, Proactive Protocols, Malicious Nodes, Wireless Ad Hoc Networks, Destination Sequence Numbers, Underwater Sensor Networks, VANETs, Cts Packet, Hybrid Routing Protocols, Source Node, Computer architecture and logic design, Computer networking and communications, Electrical engineering, WAP (wireless) technology
File Description: application/pdf
-
9
Authors:
Subject Terms: Location Based Information Systems, public, Web Service API, void, Public Void, mobile, Main Control Station, UDDI Registry, device, Java Enterprise Edition, import, Gps Receiver, javax, Jar File, main, LBS Application, control, Virtual Machine, station, cellular, Public Void Run, Gps Fix, JVM, Connected Limited Device Configuration, Import Javax, Import Java, Java SE, System Administration Functions, Indoor Positioning Systems, Java API, Information technology: general topics, Computer architecture and logic design, Computer networking and communications, Human geography
File Description: application/pdf
-
10
Authors: et al.
Subject Terms: Interrupt Handler, Internet-of-things, Mutual Exclusion Semaphore, Real-time executive for multiprocessor systems, Priority Ceiling Protocol, Cyber-physical systems, High Priority Task, Real-time operating system, Priority Inheritance Protocol, Execution Time, Scheduling Algorithms, Critical Region, Worst Case Execution Time, Task Control Block, Worst Case Response Time, Interrupt Request, Cache Line, Rate Monotonic, Context Switch, Protocol Stack, Low Priority Task, Struct Timeval, Embedded Systems, Write Operation, Computer architecture and logic design, Supercomputers, Electronics engineering, Energy, power generation, distribution and storage
File Description: application/pdf
Relation: Embedded Systems
-
11
Authors: Sarkar, Nurul
Subject Terms: WLAN Performance, Mac Protocol, next-generation Wi-Fi, Packet Delay, WLAN, Packet Drop Ratio, wireless mesh networking, Radio Propagation Environments, performance-limiting factors, Typical WLAN, Routing Protocol, Wireless Mac Protocol, MANET Routing Protocol, Network Traffic Congestion, AP Configuration, Tora, Ad Hoc Network, Mac Protocol Data Unit, Ism Band, CLD Framework, Packet Length, Wireless AP, UDP Traffic, Link Throughput, CLD Approach, Node Mobility, Cognitive Radio Networks, Wireless Fidelity, Information technology: general topics, Computer architecture and logic design, Computer networking and communications
File Description: application/pdf
-
12
Authors:
Subject Terms: ransomware, classification, prediction, Computer fraud and hacking, Causes and prevention of crime, Privacy and data protection, Digital and information technologies: Legal aspects, Computer architecture and logic design, Computer networking and communications, Hospitality and service industries, Legal aspects of criminology
File Description: application/epub+zip; application/pdf
-
13
Contributors: et al.
Subject Terms: Supply Chain Management, Optimization techniques, decision-making processes, Net Zero, Sustainable Process Engineering, Deep Neural network, SDG, Sustainable Manufacturing, Green Sustainability, Robotic Process Management, Development studies, Artificial intelligence, Real time operating systems, Software Engineering, Digital and information technologies: Health and safety aspects, Human–computer interaction, Digital and information technologies: Legal aspects, Digital and information technologies: social and ethical aspects, Computer architecture and logic design, Automatic control engineering
File Description: application/epub+zip; application/pdf
-
14
Contributors:
Subject Terms: Formal Methods, Computer-Aided System Design, Hardware and System Verification, Formal Verification, Specification, Synthesis, and Testing, Automated and Formal Reasoning, Systems analysis and design, Software testing and verification, Computer architecture and logic design, Mathematical theory of computation, Artificial intelligence
File Description: application/pdf
Relation: Conference Series: Formal Methods in Computer-Aided Design
-
15
Authors: Bartee, Thomas Creson.
Source: Bibliogr. s. 615. Indeks.
Subject Terms: Architektura komputerów, Struktura logiczna (informatyka)
-
16
Authors:
Contributors:
Source: external_content.epub
Subject Terms: thema EDItEUR::U Computing and Information Technology::UR Computer security::URH Computer fraud and hacking, thema EDItEUR::K Economics, Finance, Business and Management::KN Industry and industrial studies::KNS Hospitality and service industries, thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications, thema EDItEUR::L Law::LA Jurisprudence and general issues::LAR Legal aspects of criminology, ransomware, classification, prediction, [SCCO.LING] Cognitive science/Linguistics, thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics::UBL Digital and information technologies: Legal aspects, [INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR], thema EDItEUR::J Society and Social Sciences::JK Social services and welfare, criminology::JKV Crime and criminology::JKVC Causes and prevention of crime, thema EDItEUR::U Computing and Information Technology::UR Computer security::URD Privacy and data protection, thema EDItEUR::U Computing and Information Technology::UY Computer science::UYF Computer architecture and logic design
File Description: image/jpeg; application/pdf; application/epub+zip
Access URL: https://library.oapen.org/bitstream/20.500.12657/100445/1/9781040182925.pdf
https://directory.doabooks.org/handle/20.500.12854/157993
https://library.oapen.org/handle/20.500.12657/100445
https://inria.hal.science/hal-04704329v1
https://doi.org/10.1201/9781003528999
https://www.routledge.com/Ransomware-Analysis-Knowledge-Extraction-and-Classification-for-Advanced-Cyber-Threat-Intelligence/Lanza-Lahmadi-Francois/p/book/9781032832104
https://hdl.handle.net/20.500.11770/369737
https://doi.org/10.1201/9781003528999
https://library.oapen.org/handle/20.500.12657/100445 -
17
Authors:
Subject Terms: Electronic circuits, Microprocessors, Computer architecture, Electronics: circuits and components, Computer architecture and logic design
File Description: application/pdf
Relation: Synthesis Lectures on Computer Architecture
-
18
Authors: et al.
Subject Terms: Open Access, Electronics: circuits and components, Computer architecture and logic design
File Description: application/pdf
Relation: Synthesis Lectures on Computer Architecture
-
19
Contributors:
Subject Terms: Computer architecture and logic design, Energy
File Description: application/pdf
-
20
Contributors:
Subject Terms: Computer architecture and logic design, Energy
File Description: application/pdf
Nájsť tento článok vo Web of Science
Full Text Finder