[RDF data]
Home | Example Publications
PropertyValue
dcterms:bibliographicCitation <http://dblp.uni-trier.de/rec/bibtex/books/sp/18/LiuGQO18>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Chongyan_Gu>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Gang_Qu_0001>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/M%E2%88%9A%C2%B0ire_O%27Neill>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Weiqiang_Liu_0001>
foaf:homepage <http://dx.doi.org/doi.org%2F10.1007%2F978-3-319-98935-8%5F3>
foaf:homepage <https://doi.org/10.1007/978-3-319-98935-8_3>
dc:identifier DBLP books/sp/18/LiuGQO18 (xsd:string)
dc:identifier DOI doi.org%2F10.1007%2F978-3-319-98935-8%5F3 (xsd:string)
dcterms:issued 2018 (xsd:gYear)
rdfs:label Approximate Computing and Its Application to Hardware Security. (xsd:string)
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Chongyan_Gu>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Gang_Qu_0001>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/M%E2%88%9A%C2%B0ire_O%27Neill>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Weiqiang_Liu_0001>
swrc:pages 43-67 (xsd:string)
dcterms:partOf <https://dblp.l3s.de/d2r/resource/publications/books/sp/K2018>
owl:sameAs <http://bibsonomy.org/uri/bibtexkey/books/sp/18/LiuGQO18/dblp>
owl:sameAs <http://dblp.rkbexplorer.com/id/books/sp/18/LiuGQO18>
rdfs:seeAlso <http://dblp.uni-trier.de/db/books/collections/K2018.html#LiuGQO18>
rdfs:seeAlso <https://doi.org/10.1007/978-3-319-98935-8_3>
swrc:series <https://dblp.l3s.de/d2r/resource/collections/sp/18>
dc:title Approximate Computing and Its Application to Hardware Security. (xsd:string)
dc:type <http://purl.org/dc/dcmitype/Text>
rdf:type swrc:InCollection
rdf:type foaf:Document