This book covers the major problems of turbulence and turbulent processes, including physical phenomena, their modeling and their simulation. After a general introduction in Chapter 1 illustrating many aspects dealing with turbulent flows, averaged equations and kinetic energy budgets are provided in Chapter 2. The concept of turbulent viscosity as a closure of the Reynolds stress is also i…
This book provides a single-source reference to the state-of-the art in tunneling field effect transistors (TFETs). Readers will learn the TFETs physics from advanced atomistic simulations, the TFETs fabrication process and the important roles that TFETs will play in enabling integrated circuit designs for power efficiency.
This thesis addresses the intriguing topic of the quantum tunnelling of many-body systems such as Bose-Einstein condensates. Despite the enormous amount of work on the tunneling of a single particle through a barrier, we know very little about how a system made of several or of many particles tunnels through a barrier to open space. The present work uses numerically exact solutions of the time-…
This unique collection of chapters from world experts on person-centered outcome (PCO) measures addresses the following critical questions: Can individual experiences be represented in measurements that do not reduce unique differences to meaningless uniformity? How person-centric are PCO measures? Are PCO measurements capable of delivering the kind of quality assured quantification required fo…
The Fashion System is at the center of the international debate as one of the most polluting and most impactful industries on the environment. In the last decade the fashion industry has changed, and is still modifying, its approach, aware of the fact that the attention to the environment can no longer be considered a trend: the entire system needs to find and adopt a methodological approach to…
This book constitutes the refereed proceedings of the 11th IFIP WG 5.11 International Symposium on Environmental Software Systems, ISESS 2015, held in Melbourne, Australia, in March 2015. The 62 revised full papers presented were carefully reviewed and selected from 104 submissions. The papers are organized in the following topical sections: information systems, information modeling and semanti…
Numerical analysis presents different faces to the world. For mathematicians it is a bona fide mathematical theory with an applicable flavour. For scientists and engineers it is a practical, applied subject, part of the standard repertoire of modelling techniques. For computer scientists it is a theory on the interplay of computer architecture and algorithms for real-number calculations. The te…
This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Computing and Services, ISCTCS 2014, held in Beijing, China, in November 2014. The 51 revised full papers presented were carefully reviewed and selected from 279 submissions. The topics covered are architecture for trusted computing systems; trusted computing platform; trusted system building;…
Normal 0 false false false EN-US X-NONE X-NONE This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Trusted Systems, INTRUST 2014, held in Beijing, China, in December 2014. The conference brings together academic and industrial researchers, designers, and implementers with end-users of trusted systems, in order to foster the exchan…
This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. …