eBooks-it.org Logo
eBooks-IT.org Inner Image

Springer eBooks Page 6

Download free Springer eBooks Page 6

An Introduction to Programming in Prolog

An Introduction to Programming in Prolog Image
This book is an introduction to Prolog (rQgramming in ~ic). It presents the basic foundations of Prolog and basic and fundamental programming methods. This book is written for programmers familiar with other programming languages, as well as for novices in computer science, willing to have an original introduction to programming. The approach adopted in this book is thus based on methodological elements together with some pragmatic aspects. The book is composed of two parts. In the fIrst part the major aspects of programming in Prolog are presented step by step. Each new aspect is illustrated by short examples and exercises. The second part is composed of more developed examples, which are often games, that illustrate major aspects of artifIcial inte...

A Pipelined Multi-core MIPS Machine

Hardware Implementation and Correctness Proof
A Pipelined Multi-core MIPS Machine Image
This monograph is based on the third author's lectures on computer architecture, given in the summer semester 2013 at Saarland University, Germany. It contains a gate level construction of a multi-core machine with pipelined MIPS processor cores and a sequentially consistent shared memory.The book contains the first correctness proofs for both the gate level implementation of a multi-core processor and also of a cache based sequentially consistent shared memory. This opens the way to the formal verification of synthesizable hardware for multi-core processors in the future.Constructions are in a gate level hardware model and thus deterministic. In contrast the reference models against which correctness is shown are nondeterministic. The development of...

High-Power Optics

Lasers and Applications
High-Power Optics Image
This book covers the basics, realization and materials for high power laser systems and high power radiation interaction with matter. The physical and technical fundamentals of high intensity laser optics and adaptive optics and the related physical processes in high intensity laser systems are explained. A main question discussed is: What is power optics? In what way is it different from ordinary optics widely used in cameras, motion-picture projectors, i.e., for everyday use? An undesirable consequence of the thermal deformation of optical elements and surfaces was discovered during studies of the interaction with powerful incident laser radiation. The requirements to the fabrication, performance and quality of optical elements employed within syst...

Fundamentals of Adaptive Signal Processing

Fundamentals of Adaptive Signal Processing Image
This book is an accessible guide to adaptive signal processing methods that equips the reader with advanced theoretical and practical tools for the study and development of circuit structures and provides robust algorithms relevant to a wide variety of application scenarios. Examples include multimodal and multimedia communications, the biological and biomedical fields, economic models, environmental sciences, acoustics, telecommunications, remote sensing, monitoring and in general, the modeling and prediction of complex physical phenomena. The reader will learn not only how to design and implement the algorithms but also how to evaluate their performance for specific applications utilizing the tools provided. While using a simple mathematical langua...

Security Issues in Mobile NFC Devices

Security Issues in Mobile NFC Devices Image
This work provides an assessment of the current state of near field communication (NFC) security, it reports on new attack scenarios, and offers concepts and solutions to overcome any unresolved issues. The work describes application-specific security aspects of NFC based on exemplary use-case scenarios and uses these to focus on the interaction with NFC tags and on card emulation. The current security architectures of NFC-enabled cellular phones are evaluated with regard to the identified security aspects....



2007 - 2017 © eBooks-IT.org