|
51 |
Trusted and privacy-preserving embedded systems advances in design, analysis and application of lightweight privacy-preserving authentication and physical security primitives Wachsmann, Christian, 2013
|
|
|
52 |
Vorgehensmodelle für die technische Dokumentation eingebetteter Systeme Kapturek, Beate, 2013
|
|
|
53 |
Development, evaluation and practical application of bio-inspired algorithms Becker, Matthias, 2012
|
|
|
54 |
Heterogeneity in distributed embedded systems Baumgartner, Tobias. - Göttingen : Cuvillier, 2012, 1. Aufl.
|
|
|
55 |
Computing architectures for security applications on reconfigurable hardware in embedded systems Klimm, Alexander. - [Jockgrim] : NewArtmagic Production, 2011, 1. Aufl.
|
|
|
56 |
Von separaten Interaktionsmustern zu konsistenten Spezifikationen reaktiver Systeme Harhurin, Alexander, 2010
|
|
|
57 |
Qian ru shi xi tong ruan jian gong cheng Bei jing : Dian zi gong ye chu ban she, 2009, Di 1 ci yin shua
|
|