Name | Identifiers | Coverage |
---|---|---|
Readings in Hardware/Software Co-Design |
|
Fulltext |
Automated Planning |
|
Fulltext |
ASIC and FPGA Verification |
|
Fulltext |
RFID Security |
|
Fulltext |
Network Security |
|
Fulltext |
The System Designer's Guide to VHDL-AMS |
|
Fulltext |
Business Modeling and Data Mining |
|
Fulltext |
Strategies for Growth in SMEs |
|
Fulltext |
An Introduction to NURBS |
|
Fulltext |
Texturing and Modeling (3) |
|
Fulltext |