feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • BTU Cottbus  (7)
  • F.-Ebert-Stiftung
  • GB Zeuthen
  • Computer Science  (7)
  • Electronic books.
  • Ratgeber
Type of Medium
Language
Region
Access
  • 1
    UID:
    almahu_9949602254902882
    Format: 1 online resource (807 pages)
    Edition: 1st ed.
    ISBN: 9781484243985
    Note: Intro -- Table of Contents -- About the Authors -- Acknowledgments -- Preface -- Part 1 -- Chapter 1: Jumping Right In: "Hello, TBB!" -- Why Threading Building Blocks? -- Performance: Small Overhead, Big Benefits for C++ -- Evolving Support for Parallelism in TBB and C++ -- Recent C++ Additions for Parallelism -- The Threading Building Blocks (TBB) Library -- Parallel Execution Interfaces -- Interfaces That Are Independent of the Execution Model -- Using the Building Blocks in TBB -- Let's Get Started Already! -- Getting the Threading Building Blocks (TBB) Library -- Getting a Copy of the Examples -- Writing a First "Hello, TBB!" Example -- Building the Simple Examples -- Steps to Set Up an Environment -- Building on Windows Using Microsoft Visual Studio -- Building on a Linux Platform from a Terminal -- Using the Intel Compiler -- tbbvars and pstlvars Scripts -- Setting Up Variables Manually Without Using the tbbvars Script or the Intel Compiler -- A More Complete Example -- Starting with a Serial Implementation -- Adding a Message-Driven Layer Using a Flow Graph -- Adding a Fork-Join Layer Using a parallel_for -- Adding a SIMD Layer Using a Parallel STL Transform -- Summary -- Chapter 2: Generic Parallel Algorithms -- Functional / Task Parallelism -- A Slightly More Complicated Example: A Parallel Implementation of Quicksort -- Loops: parallel_for, parallel_reduce, and parallel_scan -- parallel_for: Applying a Body to Each Element in a Range -- A Slightly More Complicated Example: Parallel Matrix Multiplication -- parallel_reduce: Calculating a Single Result Across a Range -- A Slightly More Complicated Example: Calculating π by Numerical Integration -- parallel_scan: A Reduction with Intermediate Values -- How Does This Work? -- A Slightly More Complicated Example: Line of Sight -- Cook Until Done: parallel_do and parallel_pipeline. , parallel_do: Apply a Body Until There Are No More Items Left -- A Slightly More Complicated Example: Forward Substitution -- parallel_pipeline: Streaming Items Through a Series of Filters -- A Slightly More Complicated Example: Creating 3D Stereoscopic Images -- Summary -- For More Information -- Chapter 3: Flow Graphs -- Why Use Graphs to Express Parallelism? -- The Basics of the TBB Flow Graph Interface -- Step 1: Create the Graph Object -- Step 2: Make the Nodes -- Step 3: Add Edges -- Step 4: Start the Graph -- Step 5: Wait for the Graph to Complete Executing -- A More Complicated Example of a Data Flow Graph -- Implementing the Example as a TBB Flow Graph -- Understanding the Performance of a Data Flow Graph -- The Special Case of Dependency Graphs -- Implementing a Dependency Graph -- Estimating the Scalability of a Dependency Graph -- Advanced Topics in TBB Flow Graphs -- Summary -- Chapter 4: TBB and the Parallel Algorithms of the C++ Standard Template Library -- Does the C++ STL Library Belong in This Book? -- A Parallel STL Execution Policy Analogy -- A Simple Example Using std::for_each -- What Algorithms Are Provided in a Parallel STL Implementation? -- How to Get and Use a Copy of Parallel STL That Uses TBB -- Algorithms in Intel's Parallel STL -- Capturing More Use Cases with Custom Iterators -- Highlighting Some of the Most Useful Algorithms -- std::for_each, std::for_each_n -- std::transform -- std::reduce -- std::transform_reduce -- A Deeper Dive into the Execution Policies -- The sequenced_policy -- The parallel_policy -- The unsequenced_policy -- The parallel_unsequenced_policy -- Which Execution Policy Should We Use? -- Other Ways to Introduce SIMD Parallelism -- Summary -- For More Information -- Chapter 5: Synchronization: Why and How to Avoid It -- A Running Example: Histogram of an Image -- An Unsafe Parallel Implementation. , A First Safe Parallel Implementation: Coarse-Grained Locking -- Mutex Flavors -- A Second Safe Parallel Implementation: Fine-Grained Locking -- A Third Safe Parallel Implementation: Atomics -- A Better Parallel Implementation: Privatization and Reduction -- Thread Local Storage, TLS -- enumerable_thread_specific, ETS -- combinable -- The Easiest Parallel Implementation: Reduction Template -- Recap of Our Options -- Summary -- For More Information -- Chapter 6: Data Structures for Concurrency -- Key Data Structures Basics -- Unordered Associative Containers -- Map vs. Set -- Multiple Values -- Hashing -- Unordered -- Concurrent Containers -- Concurrent Unordered Associative Containers -- concurrent_hash_map -- Concurrent Support for map/multimap and set/multiset Interfaces -- Built-In Locking vs. No Visible Locking -- Iterating Through These Structures Is Asking for Trouble -- Concurrent Queues: Regular, Bounded, and Priority -- Bounding Size -- Priority Ordering -- Staying Thread-Safe: Try to Forget About Top, Size, Empty, Front, Back -- Iterators -- Why to Use This Concurrent Queue: The A-B-A Problem -- When to NOT Use Queues: Think Algorithms! -- Concurrent Vector -- When to Use tbb::concurrent_vector Instead of std::vector -- Elements Never Move -- Concurrent Growth of concurrent_vectors -- Summary -- Chapter 7: Scalable Memory Allocation -- Modern C++ Memory Allocation -- Scalable Memory Allocation: What -- Scalable Memory Allocation: Why -- Avoiding False Sharing with Padding -- Scalable Memory Allocation Alternatives: Which -- Compilation Considerations -- Most Popular Usage (C/C++ Proxy Library): How -- Linux: malloc/new Proxy Library Usage -- macOS: malloc/new Proxy Library Usage -- Windows: malloc/new Proxy Library Usage -- Testing our Proxy Library Usage -- C Functions: Scalable Memory Allocators for C. , C++ Classes: Scalable Memory Allocators for C++ -- Allocators with std::allocator< -- T> -- Signature -- scalable_allocator -- tbb_allocator -- zero_allocator -- cached_aligned_allocator -- Memory Pool Support: memory_pool_allocator -- Array Allocation Support: aligned_space -- Replacing new and delete Selectively -- Performance Tuning: Some Control Knobs -- What Are Huge Pages? -- TBB Support for Huge Pages -- scalable_allocation_mode(int mode, intptr_t value) -- TBBMALLOC_USE_HUGE_PAGES -- TBBMALLOC_SET_SOFT_HEAP_LIMIT -- int scalable_allocation_command(int cmd, void ∗param) -- TBBMALLOC_CLEAN_ALL_BUFFERS -- TBBMALLOC_CLEAN_THREAD_BUFFERS -- Summary -- Chapter 8: Mapping Parallel Patterns to TBB -- Parallel Patterns vs. Parallel Algorithms -- Patterns Categorize Algorithms, Designs, etc. -- Patterns That Work -- Data Parallelism Wins -- Nesting Pattern -- Map Pattern -- Workpile Pattern -- Reduction Patterns (Reduce and Scan) -- Fork-Join Pattern -- Divide-and-Conquer Pattern -- Branch-and-Bound Pattern -- Pipeline Pattern -- Event-Based Coordination Pattern (Reactive Streams) -- Summary -- For More Information -- Part 2 -- Chapter 9: The Pillars of Composability -- What Is Composability? -- Nested Composition -- Concurrent Composition -- Serial Composition -- The Features That Make TBB a Composable Library -- The TBB Thread Pool (the Market) and Task Arenas -- The TBB Task Dispatcher: Work Stealing and More -- Putting It All Together -- Looking Forward -- Controlling the Number of Threads -- Work Isolation -- Task-to-Thread and Thread-to-Core Affinity -- Task Priorities -- Summary -- For More Information -- Chapter 10: Using Tasks to Create Your Own Algorithms -- A Running Example: The Sequence -- The High-Level Approach: parallel_invoke -- The Highest Among the Lower: task_group -- The Low-Level Task Interface: Part One - Task Blocking. , The Low-Level Task Interface: Part Two - Task Continuation -- Bypassing the Scheduler -- The Low-Level Task Interface: Part Three - Task Recycling -- Task Interface Checklist -- One More Thing: FIFO (aka Fire-and-Forget) Tasks -- Putting These Low-Level Features to Work -- Summary -- For More Information -- Chapter 11: Controlling the Number of Threads Used for Execution -- A Brief Recap of the TBB Scheduler Architecture -- Interfaces for Controlling the Number of Threads -- Controlling Thread Count with task_scheduler_init -- Controlling Thread Count with task_arena -- Controlling Thread Count with global_control -- Summary of Concepts and Classes -- The Best Approaches for Setting the Number of Threads -- Using a Single task_scheduler_init Object for a Simple Application -- Using More Than One task_scheduler_init Object in a Simple Application -- Using Multiple Arenas with Different Numbers of Slots to Influence Where TBB Places Its Worker Threads -- Using global_control to Control How Many Threads Are Available to Fill Arena Slots -- Using global_control to Temporarily Restrict the Number of Available Threads -- When NOT to Control the Number of Threads -- Figuring Out What's Gone Wrong -- Summary -- Chapter 12: Using Work Isolation for Correctness and Performance -- Work Isolation for Correctness -- Creating an Isolated Region with  this_task_arena::isolate -- Oh No! Work Isolation Can Cause Its Own Correctness Issues! -- Even When It Is Safe, Work Isolation Is Not Free -- Using Task Arenas for Isolation: A Double-Edged Sword -- Don't Be Tempted to Use task_arenas to Create Work Isolation for Correctness -- Summary -- For More Information -- Chapter 13: Creating Thread-to-Core and Task-to-Thread Affinity -- Creating Thread-to-Core Affinity -- Creating Task-to-Thread Affinity -- When and How Should We Use the TBB Affinity Features? -- Summary. , For More Information.
    Additional Edition: Print version: Voss, Michael Pro TBB Berkeley, CA : Apress L. P.,c2019 ISBN 9781484243978
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Electronic books. ; Electronic books
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Full-text  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    UID:
    almahu_9949845825102882
    Format: 1 online resource (446 pages)
    Edition: 1st ed.
    ISBN: 9783031540493
    Series Statement: Studies in Computational Intelligence Series ; v.1147
    Note: Intro -- Acknowledgements -- Contents -- Contributors -- Abbreviations -- Introduction -- Going to the Edge: Bringing Artificial Intelligence and Internet of Things Together -- 1 Introduction -- 2 Objectives -- 3 Trustworthiness -- 4 Building on a Sound Basis -- 5 Driven Through Industrial Applications -- 6 Building Technology for Intelligent, Secure, Trustworthy Things -- 7 Reference Architecture for Trustworthy AIoT -- 8 Summary -- References -- The Development of Ethical and Trustworthy AI Systems Requires Appropriate Human-Systems Integration -- 1 Is Trustworthiness of AI a Problem? -- 2 Current Initiatives to Address Trustworthiness of AI -- 2.1 Guidelines and Regulations -- 2.2 Implementation Support -- 2.3 Observed Gaps in Current Initiatives -- 3 From Technology-Centered to Human-Centered Development of Smart Technologies -- 3.1 Orchestrating the Development of Ethical and Trustworthy AI -- 4 Conclusions -- References -- The InSecTT Reference Architecture -- 1 Introduction -- 2 AI in IoT Architectures -- 3 Overview of the InSecTT Architecture -- 3.1 Evolution of the Bubble -- 3.2 Modern Reference Architectures -- 4 Entity Model -- 5 Layered Model -- 5.1 Level 0 -- 5.2 Level 1 -- 5.3 Level 2 -- 5.4 Hardware Interfaces -- 6 Domain Model -- 7 Functionality Model -- 7.1 SW Interfaces -- 8 Information Model -- 9 AI Perspective of the Architecture -- 10 Example Use Cases Alignment -- 10.1 Overview -- 10.2 Entity Model -- 10.3 Functionality model -- 10.4 Interfaces -- 10.5 General Project Overview for Architecture Alignment -- References -- Structuring the Technology Landscape for Successful Innovation in AIoT -- 1 Motivation -- 2 How to Structure Research and Development to Enact an Ambitious Project Vision -- 3 Requirements and Constraints -- 4 Requirement Engineering Process -- 5 Navigating the Landscape: Planning R& -- D Work. , 6 External Alignment -- 7 Documenting Scope, Work and Results -- 8 Progress Assessment and Validation -- 9 Demonstrators -- 10 Preparing for Market: Exploitation -- 11 InSecTT Exploitation Board (EB) -- 12 Use Case Marketplace -- 13 Open Innovation -- 14 Publications to Prepare Markets -- 15 Website and Social Networks -- 16 Industrial Conferences, Trade Fairs and Podcasts -- Technology Development -- InSecTT Technologies for the Enhancement of Industrial Security and Safety -- 1 Introduction -- 2 Background -- 2.1 Industrial Automation and Control Systems -- 3 Selected InSecTT Technologies Targeting Security and Safety -- 3.1 Access Control and Authentication Infrastructure -- 3.2 Intrusion Detection Systems -- 3.3 Tools, Simulators and Datasets -- 3.4 Safety and Security Analysis for AGV Platooning -- 4 Novelty and Applicability of Proposed Technologies -- 5 Conclusions and Future Perspectives -- References -- Algorithmic and Implementation-Based Threats for the Security of Embedded Machine Learning Models -- 1 Introduction -- 2 Threat Models -- 2.1 Formalism -- 2.2 Adversarial Objectives -- 2.3 The System Under Attack -- 2.4 Knowledge and Capacity of an Adversary -- 2.5 Attack Surface -- 3 A Panorama of Algorithmic Attacks -- 3.1 Confidentiality and Privacy Threats -- 3.2 Integrity-Based Attacks -- 3.3 Availability -- 4 A Focus on Physical Attacks -- 4.1 Model Extraction Based on Side-Channel Analysis -- 4.2 Weight-Based Adversarial Attacks -- 5 Protecting ML System -- 5.1 Embedded Authentication Mechanism -- 5.2 Main Defenses Against Algorithmic Attacks -- 5.3 Countermeasures Against Physical Attacks -- 6 Conclusion -- References -- Explainable Anomaly Detection of 12-Lead ECG Signals Using Denoising Autoencoder -- 1 Introduction -- 2 Anomaly Detection and Explainability in Deep Learning. , 3 Denosisng Autoencoder as an Explainable Anomaly Detection Model for ECGs -- 3.1 ECG Data Sets -- 3.2 Model Architecture and Training -- 3.3 Results of Denoising and the Exploration of the Latent Space -- 4 Cloud-Based Service and Visualization of Explainable Anomaly Detection on ECGs -- 5 Conclusion -- References -- Indoor Navigation with a Smartphone -- 1 Introduction -- 2 Encoding Information in QR -- 3 Navigation -- 4 Local to Global Coordinates -- 5 Triage -- 6 Future Work -- 7 Conclusions -- References -- Reconfigurable Antennas for Trustable Things -- 1 Introduction -- 2 Electronically Steerable Parasitic Array Radiator Antenna for Trustable Things -- 2.1 Concept -- 2.2 Design -- 2.3 Realization -- 3 Applications -- 3.1 Direction of Arrival Estimation -- 3.2 Power Pattern Cross-Correlation Algorithm -- 3.3 Interpolation-Based Estimation -- 3.4 Multiplane Calibration for 2D DoA Estimation -- 3.5 DoA-Based Object Positioning -- 3.6 Single-Anchor Positioning System -- 3.7 Calibration-Free Indoor Localization -- 3.8 Other Applications -- References -- AI-Enhanced Connection Management for Cellular Networks -- 1 Introduction -- 2 Related Work -- 2.1 Data Rate Estimation -- 2.2 Interface Selection -- 3 Use Case and Research Challenge -- 4 Data Collection and Analysis -- 5 Uplink Data Rate Estimation -- 6 Interface Decision -- 7 Conclusion -- References -- Vehicle Communication Platform to Anything-VehicleCAPTAIN -- 1 Introduction -- 2 Problem Statement -- 3 VehicleCAPTAIN-A V2X Platform for Research and Development -- 3.1 The Platform -- 3.2 Message Library -- 3.3 ROS2 Support -- 4 Verification -- 4.1 Test Methodology -- 4.2 Results -- 4.3 Discussion -- 5 Key Performance Indicators -- 5.1 Use Cases Within InSecTT -- 5.2 Use Cases Within the Virtual Vehicle Research GmbH -- 6 Conclusion -- References. , AI-Enhanced UWB-Based Localisation in Wireless Networks -- 1 Introduction -- 2 Method Overview -- 3 AI for Solving UWB-Based Localisation Challenges -- 3.1 Localisation Challenges -- 3.2 AI Algorithms in UWB-Based Localisation Systems -- 4 Overview of Related Work -- 5 Application Example -- 5.1 KNN for LOS/NLOS Detection -- 5.2 KNN for Error Mitigation and Trustworthiness -- 6 Conclusion -- References -- Industrial Applications -- Approaches for Automating Cybersecurity Testing of Connected Vehicles -- 1 Introduction -- 2 State of the Art and Related Work -- 3 Automotive Cybersecurtiy Lifecycle Management -- 3.1 Threat Modeling -- 4 Cybersecurity Testing -- 4.1 Learning-Based Testing -- 4.2 Model-Based Test Case Generation -- 4.3 Testing Platform -- 4.4 Automated Test Execution -- 4.5 Fuzzing -- 5 Conclusion -- References -- Solar-Based Energy Harvesting and Low-Power Wireless Networks -- 1 Introduction -- 1.1 Solar-Based Energy Harvesting -- 2 Low-Power Network Protocols -- 2.1 Bluetooth Low Energy -- 2.2 IEEE 802.15.4 and Thread -- 2.3 EPhESOS Protocol -- 2.4 UWB Localisation -- 3 Power Consumption in Different Scenarios -- 3.1 Measurement Setup and Hardware -- 3.2 Power Consumption with Increasing Update Period -- 4 Available Energy in Real-World Scenarios -- 5 Experimental Results -- 6 Conclusion -- References -- Location Awareness in HealthCare -- 1 Terminology and Technology -- 1.1 Positioning, Localization, Tracking and Navigation -- 1.2 RF-Based Indoor Localization Technologies -- 1.3 Non-RF Based Localization Technologies -- 2 Pedestrian Dead Reckoning (PDR) -- 3 Others -- 3.1 Outdoor Localization Technologies -- 3.2 Technology Overview -- 4 Designing an End-To-End IoT Solution -- 4.1 Commissioning -- 4.2 Low Power Wide Area Networks (LPWAN) -- 4.3 Battery Lifetime -- 4.4 Going from Indoor to Outdoor -- 4.5 APIs for Location Services. , 4.6 Visualizing on a Map -- 4.7 Security and Privacy Aspects -- 5 Healthcare Use-Cases -- 5.1 Asset Tracking -- 5.2 Mass Casualty Incident (MCI) -- 5.3 Bed Management -- 5.4 Hospital Wayfinding -- 6 Use-Case Concept Demonstrator -- 6.1 Architecture -- 6.2 GeoJSON Server -- 6.3 Client Authentication -- 6.4 FHIR Compatibility -- 6.5 Location and Privacy -- 6.6 Additional Features -- 7 Conclusions/Next Steps -- References -- Driver Distraction Detection Using Artificial Intelligence and Smart Devices -- 1 Introduction -- 2 Definitions and Background -- 3 System Design -- 4 Machine Learning-Based Components -- 4.1 Use Case Definition and Components' Architecture -- 4.2 Data Acquisition and Pre-processing -- 4.3 Machine Learning Model Training and Experimental Results -- 4.4 Model Deployment on Smart Devices -- 5 Dashboard Application for Driver Distraction -- 6 Related Work -- 7 Conclusion and Future Work -- References -- Working with AIoT Solutions in Embedded Software Applications. Recommendations, Guidelines, and Lessons Learned -- 1 Introduction -- 2 Project Description and Goals -- 3 Project Design -- 4 Machine Learning in Embedded Systems -- 5 Communication Platform -- 5.1 Design Layout -- 5.2 Message Queuing with RabbitMQ -- 5.3 Inter-Process Messaging -- 6 Data Extraction -- 7 Training Data Set and Model -- 7.1 Design Stage 1 -- 7.2 Design Stage 2 -- 7.3 Alternative Model Setup -- 8 Cloud or Edge? -- 9 Security -- 10 Conclusion -- Appendix A -- Appendix B -- References -- Artificial Intelligence for Wireless Avionics Intra-Communications -- 1 Introduction -- 2 Use Case Objectives -- 3 Link Between Scenarios and Building Blocks -- 4 State of the Art -- 5 AI/IoT Added Value -- 6 Scenarios -- 6.1 Scenario 1: Interference Detection and Cancellation -- 6.2 Scenario 2: Verification and Validation of WAICs -- 6.3 Scenario 3: Battery-Less Devices. , 7 Performance Evaluation.
    Additional Edition: Print version: Karner, Michael Intelligent Secure Trustable Things Cham : Springer International Publishing AG,c2024 ISBN 9783031540486
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Electronic books.
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    b3kat_BV041578930
    Format: IX, 402 S. , Ill., graph. Darst. , 25 cm
    Edition: 2., erw. Aufl.
    ISBN: 3446439099 , 9783446439092
    Additional Edition: Erscheint auch als Online-Ausgabe ISBN 978-3-446-43954-2
    Former: 1. Auflage Firnkes, Michael Professionelle Webtexte
    Language: German
    Subjects: Computer Science , Economics
    RVK:
    RVK:
    Keywords: Unternehmen ; Online-Shop ; Online-Marketing ; Werbesprache ; Formulierung ; Ratgeber
    Author information: Firnkes, Michael
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Chichester :Wiley,
    UID:
    almafu_BV040601364
    Format: 1 Online-Ressource (XXIV, 1051 Seiten) : , Illustrationen.
    Edition: Second edition
    ISBN: 978-1-118-44890-8 , 978-1-118-44894-6
    Note: Erscheinungsjahr der Druckausgabe: 2012. - Previous ed.: 2007
    Additional Edition: Erscheint auch als Druck-Ausgabe, Hardcover ISBN 978-0-470-97392-9
    Additional Edition: ISBN 0-470-97392-7
    Language: English
    Subjects: Computer Science , Economics , Biology , Mathematics
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Statistik ; R ; Zeitreihenanalyse ; Electronic books. ; Electronic books. ; Electronic books.
    Author information: Crawley, Michael J. 1949-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Book
    Book
    München [u.a.] :Addison Wesley,
    UID:
    almahu_BV025591882
    Format: 461 S. : , Ill. , 2 CD-ROM (12cm)
    ISBN: 978-3-8273-2912-7
    Series Statement: Open source library
    Language: German
    Subjects: Computer Science
    RVK:
    Keywords: LINUX ; Ubuntu ; Ratgeber
    Author information: Kofler, Michael, 1967-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almahu_BV012186779
    Format: 224 S. : , Ill.
    Edition: 1. Aufl.
    ISBN: 3-89721-151-3
    Series Statement: O'Reilly Essentials
    Later: 2. Aufl. (2001) u.d.T. Lutz, Michael E-Mail effektiv nutzen
    Language: German
    Subjects: Computer Science
    RVK:
    RVK:
    Keywords: E-Mail ; Ratgeber ; Ratgeber
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Wiesbaden : VS Verlag für Sozialwissenschaften
    UID:
    b3kat_BV042429811
    Format: 1 Online-Ressource (48S.)
    ISBN: 9783322876218 , 9783531031811
    Series Statement: Forschungsberichte des Landes Nordrhein-Westfalen, Fachgruppe Elektrotechnik/Optik 3181
    Language: German
    Subjects: Computer Science , General works
    RVK:
    RVK:
    RVK:
    Keywords: Mikroprozessor ; Fehlertoleranz ; Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages