Linked e-resources
Details
Table of Contents
Chapter 1. Introduction
Chapter 2. Background
Chapter 3. Design Understanding Methodology
Chapter 4. Application I: Verification
Chapter 5. Application II: Security Validation
Chapter 6. Application III: Design Space Exploration
Chapter 7. Conclusion.
Chapter 2. Background
Chapter 3. Design Understanding Methodology
Chapter 4. Application I: Verification
Chapter 5. Application II: Security Validation
Chapter 6. Application III: Design Space Exploration
Chapter 7. Conclusion.