Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Discrete and Computational Geometry, Second Edition (Discrete Mathematics and Its Applications)
Handbook of Discrete and Computational Geometry, Second Edition (Discrete Mathematics and Its Applications)

While high-quality books and journals in this field continue to proliferate, none has yet come close to matching the Handbook of Discrete and Computational Geometry, which in its first edition, quickly became the definitive reference work in its field. But with the rapid growth of the discipline and the many advances made over the past seven...

The Circuits and Filters Handbook, Second Edition (Five Volume Slipcase Set) (Electrical Engineering Handbook)
The Circuits and Filters Handbook, Second Edition (Five Volume Slipcase Set) (Electrical Engineering Handbook)

A bestseller in its first edition, The Circuits and Filters Handbook has been thoroughly updated to provide the most current, most comprehensive information available in both the classical and emerging fields of circuits and filters, both analog and digital. This edition contains 29 new chapters, with significant additions in the areas of...

A Primer for the Monte Carlo Method
A Primer for the Monte Carlo Method

The Monte Carlo method is a numerical method of solving mathematical problems through random sampling. As a universal numerical technique, the method became possible only with the advent of computers, and its application continues to expand with each new computer generation. A Primer for the Monte Carlo Method demonstrates how practical...

Elliptic Curves: Number Theory and Cryptography, Second Edition (Discrete Mathematics and Its Applications)
Elliptic Curves: Number Theory and Cryptography, Second Edition (Discrete Mathematics and Its Applications)
Over the last two or three decades, elliptic curves have been playing an increasingly important role both in number theory and in related fields such as cryptography. For example, in the 1980s, elliptic curves started being used in cryptography and elliptic curve techniques were developed for factorization and primality...
Electric Power Transformer Engineering, Second Edition
Electric Power Transformer Engineering, Second Edition

It is appropriate that I first acknowledge my appreciation to Professor Leo Grigsby for inviting me to prepare the chapter on power transformers for the first edition (2001) of his now very popular Electric Power Engineering Handbook. From this evolved the recognition that two chapters from the 2001 Handbook, those for (1) substations...

Handbook of Discrete and Computational Geometry
Handbook of Discrete and Computational Geometry

While books and journals of high quality have proliferated in discrete and compu- tational geometry during recent years, there has been to date no single reference work fully accessible to the nonspecialist as well as to the specialist, covering all the major aspects of both fields. The Handbook of Discrete and Computational Geometry...

Circuits, Signals, and Speech and Image Processing (The Electrical Engineering Handbook Third Edition)
Circuits, Signals, and Speech and Image Processing (The Electrical Engineering Handbook Third Edition)

The purpose of The Electrical Engineering Handbook, 3rd Edition is to provide a ready reference for the practicing engineer in industry, government, and academia, as well as aid students of engineering. The third edition has a new look and comprises six volumes including:

Circuits, Signals, and Speech and Image Processing...

Numerical Methods, Algorithms and Tools in C#
Numerical Methods, Algorithms and Tools in C#

Today, more than at any other time in the history of mankind, computers are increasingly and successfully being exploited to gain a better understanding of our physical world and as a result, also deepen our appreciation and reverence for God’s Creation. Consequently, as computers evolve, so must the means to control them through...

Cryptanalysis of RSA and Its Variants
Cryptanalysis of RSA and Its Variants

Thirty years after RSA was first publicized, it remains an active research area. Although several good surveys exist, they are either slightly outdated or only focus on one type of attack. Offering an updated look at this field, Cryptanalysis of RSA and Its Variants presents the best known mathematical attacks on RSA and its...

Bayesian Artificial Intelligence, Second Edition
Bayesian Artificial Intelligence, Second Edition

Updated and expanded, Bayesian Artificial Intelligence, Second Edition provides a practical and accessible introduction to the main concepts, foundation, and applications of Bayesian networks. It focuses on both the causal discovery of networks and Bayesian inference procedures. Adopting a causal interpretation of Bayesian...

The Compiler Design Handbook: Optimizations & Machine Code Generation
The Compiler Design Handbook: Optimizations & Machine Code Generation

In the last few years, changes have had a profound influence on the problems addressed by compiler designers. First, the proliferation in machine architectures has necessitated the fine-tuning of compiler back ends to exploit features such as multiple memory banks, pipelines and clustered architectures. These features provide potential for...

Geographic Data Mining and Knowledge Discovery, Second Edition
Geographic Data Mining and Knowledge Discovery, Second Edition

Similar to many research and application fields, geography has moved from a datapoor and computation-poor to a data-rich and computation-rich environment. The scope, coverage, and volume of digital geographic datasets are growing rapidly. Public and private sector agencies are creating, processing, and disseminating digital data on land use,...

Result Page: 93 92 91 90 89 88 87 86 85 84 83 82 81 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy