Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
Doing Bayesian Data Analysis: A Tutorial with R and BUGS
Doing Bayesian Data Analysis: A Tutorial with R and BUGS

There is an explosion of interest in Bayesian statistics, primarily because recently created computational methods have finally made Bayesian analysis tractable and accessible to a wide audience. Doing Bayesian Data Analysis, A Tutorial Introduction with R and BUGS, is for first year graduate students or advanced undergraduates and provides...

Statistical Mechanics, Third Edition
Statistical Mechanics, Third Edition

This classic text, first published in 1972, is designed for graduate physics courses in statistical mechanics. The second edition, published in 1996, incorporated three comprehensive chapters on phase transitions and critical phenomena.

This third edition includes new sections on Bose-Einstein condensation and degenerate Fermi...

Mobile WiMAX: A Systems Approach to Understanding IEEE 802.16m Radio Access Technology
Mobile WiMAX: A Systems Approach to Understanding IEEE 802.16m Radio Access Technology

Presenting the new IEEE 802.16m standard, this is the first book to take a systematic, top-down approach to describing Mobile WiMAX and its next generation, giving detailed algorithmic descriptions together with explanations of the principles behind the operation of individual air-interface protocols and network components.

...

Principles of Cloning, Second Edition
Principles of Cloning, Second Edition

  Principles of Cloning, Second Edition is the fully revised edition of the authoritative book on the science of cloning. The book presents the basic biological mechanisms of how cloning works and progresses to discuss current and potential applications in basic biology, agriculture, biotechnology, and medicine. Beginning with the...

Food Safety Management: A Practical Guide for the Food Industry
Food Safety Management: A Practical Guide for the Food Industry

Food Safety Management: A Practical Guide for the Food Industry with an Honorable Mention for Single Volume Reference/Science in the 2015 PROSE Awards from the Association of American Publishers is the first book to present an integrated, practical approach to the management of food safety throughout the production chain. While many...

New Models of the Cell Nucleus: Crowding, Entropic Forces, Phase Separation, and Fractals, Volume 307
New Models of the Cell Nucleus: Crowding, Entropic Forces, Phase Separation, and Fractals, Volume 307

International Review of Cell and Molecular Biology presents current advances and comprehensive reviews in cell biology--both plant and animal. Articles address structure and control of gene expression, nucleocytoplasmic interactions, control of cell development and differentiation, and cell transformation and growth. Impact factor...

Algorithmic Graph Theory and Perfect Graphs (Computer science and applied mathematics)
Algorithmic Graph Theory and Perfect Graphs (Computer science and applied mathematics)

Algorithmic Graph Theory and Perfect Graphs, first published in 1980, has become the classic introduction to the field. This new Annals edition continues to convey the message that intersection graph models are a necessary and important tool for solving real-world problems. It remains a stepping stone from which the reader may embark on one...

Computational Finance Using C and C# (Quantitative Finance)
Computational Finance Using C and C# (Quantitative Finance)
In Computational Finance Using C and C# George Levy raises computational finance to the next level using the languages of both standard C and C#. The inclusion of both these languages enables readers to match their use of the book to their firms internal software and code requirements. Levy also provides derivatives pricing information for:
...
IMS Application Developer's Handbook: Creating and Deploying Innovative IMS Applications
IMS Application Developer's Handbook: Creating and Deploying Innovative IMS Applications
Many books have been written about IMS, so why do we think another is needed? Most of the existing books are written from the perspective of those who implement the technology, either network vendors or operators. There is no such focus for developers. The standards that form the basis of IMS are complex – as they are...
Principles of Addiction: Comprehensive Addictive Behaviors and Disorders, Volume 1
Principles of Addiction: Comprehensive Addictive Behaviors and Disorders, Volume 1

Principles of Addiction provides a solid understanding of the definitional and diagnostic differences between use, abuse, and disorder. It describes in great detail the characteristics of these syndromes and various etiological models.

The book's three main sections examine the nature of addiction, including...

Matrix Methods, Third Edition: Applied Linear Algebra
Matrix Methods, Third Edition: Applied Linear Algebra

Matrix Methods: Applied Linear Algebra, 3e, as a textbook, provides a unique and comprehensive balance between the theory and computation of matrices. The application of matrices is not just for mathematicians. The use by other disciplines has grown dramatically over the years in response to the rapid changes in technology. Matrix methods is...

Handbook of Computer Crime Investigation: Forensic Tools & Technology
Handbook of Computer Crime Investigation: Forensic Tools & Technology
Computers can be used in virtually any type of crime, ranging from cyberstalking and child pornography to financial fraud, espionage and terrorism. The Handbook of Computer crime investigation presents detailed technical information that can be used to help solve these crimes.

Following on the success of his introductory text, Digital
...
Result Page: 29 28 27 26 25 24 23 22 21 20 
©2017 LearnIT (support@pdfchm.net) - Privacy Policy