Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Algorithms for VLSI Design Automation
Algorithms for VLSI Design Automation
Modern microprocessors such as Intel's Pentium chip typically contain millions of transitors. Known generically as Very Large-Scale Integrated (VLSI) systems, the chips have a scale and complexity that has necessitated the development of CAD tools to automate their design. This book focuses on the algorithms which are the building blocks of...
Concurrent, Real-Time and Distributed Programming in Java: Threads, RTSJ and RMI (Focus: Computer Science)
Concurrent, Real-Time and Distributed Programming in Java: Threads, RTSJ and RMI (Focus: Computer Science)

This book provides an introduction to concurrent, real-time, distributed programming with Java object-oriented language support as an algorithm description tool. It describes in particular the mechanisms of synchronization (cooperative and competitive) and sharing of data (internal class, static variables) between threads in Java. He...

The Design Thinking Playbook: Mindful Digital Transformation of Teams, Products, Services, Businesses and Ecosystems
The Design Thinking Playbook: Mindful Digital Transformation of Teams, Products, Services, Businesses and Ecosystems

A radical shift in perspective to transform your organization to become more innovative

The Design Thinking Playbook is an actionable guide to the future of business. By stepping back and questioning the current mindset, the faults of the status quo stand out in stark relief—and this guide gives you the tools...

Multicore DSP: From Algorithms to Real-time Implementation on the TMS320C66x SoC
Multicore DSP: From Algorithms to Real-time Implementation on the TMS320C66x SoC

The only book to offer special coverage of the fundamentals of multicore DSP for implementation on the TMS320C66xx SoC

This unique book provides readers with an understanding of the TMS320C66xx SoC as well as its constraints. It offers critical analysis of each element, which not only broadens their knowledge of...

DNS Security Management (IEEE Press Series on Networks and Service Management)
DNS Security Management (IEEE Press Series on Networks and Service Management)

An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies  

DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This...

The Data Warehouse Toolkit: The Definitive Guide to Dimensional Modeling
The Data Warehouse Toolkit: The Definitive Guide to Dimensional Modeling

Updated new edition of Ralph Kimball's groundbreaking book on dimensional modeling for data warehousing and business intelligence!

The first edition of Ralph Kimball's The Data Warehouse Toolkit introduced the industry to dimensional modeling, and now his books are considered the most authoritative...

MDX Solutions: With Microsoft SQL Server Analysis Services
MDX Solutions: With Microsoft SQL Server Analysis Services
A hands-on tutorial on building and using multidimensional data warehouses

The SQL query language is used to access data in most simple databases. But for multidimensional (or OLAP) data warehouses, Microsoft developed MDX. The MDX query language has become essential know-how for developers and users alike, whether for data
...
Computational Physics: Problem Solving with Python
Computational Physics: Problem Solving with Python
The use of computation and simulation has become an essential part of the scientific process. Being able to transform a theory into an algorithm requires significant theoretical insight, detailed physical and mathematical understanding, and a working level of competency in programming.

This upper-division text provides an
...
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

Master Wireshark to solve real-world security problems

If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security...

Handbook of Machine and Computer Vision: The Guide for Developers and Users
Handbook of Machine and Computer Vision: The Guide for Developers and Users

The second edition of this accepted reference work has been updated to reflect the rapid developments in the field and now covers both 2D and 3D imaging.
Written by expert practitioners from leading companies operating in machine vision, this one-stop handbook guides readers through all aspects of image acquisition and image
...

Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence

Investigate crimes involving cryptocurrencies and other blockchain technologies

Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their...

Derivatives Analytics with Python: Data Analysis, Models, Simulation, Calibration and Hedging (The Wiley Finance Series)
Derivatives Analytics with Python: Data Analysis, Models, Simulation, Calibration and Hedging (The Wiley Finance Series)

Supercharge options analytics and hedging using the power ofPython

Derivatives Analytics with Python shows you how toimplement market-consistent valuation and hedging approaches usingadvanced financial models, efficient numerical techniques, and thepowerful capabilities of the Python programming language. Thisunique...

Result Page: 308 307 306 305 304 303 302 301 300 299 298 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy