Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Formal Concept Analysis: Foundations and Applications (Lecture Notes in Computer Science)
Formal Concept Analysis: Foundations and Applications (Lecture Notes in Computer Science)
Formal concept analysis has been developed as a field of applied mathematics based on the mathematization of concept and concept hierarchy. It thereby allows us to mathematically represent, analyze, and construct conceptual structures. The formal concept analysis approach has been proven successful in a wide range of application fields.

This...

Enterprise Architecture at Work: Modelling, Communication and Analysis
Enterprise Architecture at Work: Modelling, Communication and Analysis
Many stakeholders within and outside the company can be identified, ranging from top-level management to software engineers. Each stakeholder requires specific information presented in an accessible way, to deal with the impact of such wide-ranging developments. To predict the effects of such developments and modifications of an...
Theoretical Aspects of Local Search (Monographs in Theoretical Computer Science. An EATCS Series)
Theoretical Aspects of Local Search (Monographs in Theoretical Computer Science. An EATCS Series)
In 1958 Croes published a twenty page article in Operations Research describing a new method to handle traveling salesman problems based on the iterative use of simple edge-exchange mechanisms. This article can be seen as the seminal paper on local search, reporting for the first time the success of simple neighborhood-based iteration methods when...
Fundamentals of Computer Organization and Design
Fundamentals of Computer Organization and Design
This advanced textbook provides a comprehensive survey of hardware and software architectural principles and methods of computer systems organization and design. It covers both CISC and RISC processors in detail, presenting Pentium, PowerPC, MIPS, SPARC and Itanium. In addition, assembly language programming for both CISC (Pentium) and RISC...
Wireless Communications: 2007 CNIT Thyrrenian Symposium (Signals and Communication Technology)
Wireless Communications: 2007 CNIT Thyrrenian Symposium (Signals and Communication Technology)
The 18th Tyrrhenian Workshop on digital communications is devoted to wireless communications. In the last decade, wireless communications research boosted launching new standards and proposing new techniques for the access technology. We moved from the UTRA standard capable to transmit 0.5 bit/s/Hz to WLAN which is promising 2.7 bit/s/Hz. Now...
Recent Advances in Modeling and Simulation Tools for Communication Networks and Services
Recent Advances in Modeling and Simulation Tools for Communication Networks and Services
Simulation for research and design accounts for a substantial fraction of engineering computation. With valid and credible models, simulation is often dramatically more cost-effective than are real experiments, which can be expensive, dangerous, or, in fact, impossible because a new system may not yet be available.

Modeling and
...
Querying Databases Privately: A New Approach to Private Information Retrieval (Lecture Notes in Computer Science)
Querying Databases Privately: A New Approach to Private Information Retrieval (Lecture Notes in Computer Science)
The Internet and the worldwide web play an increasingly important role in our private and professional activities, for example in accessing information about cultural, political, economical, medical or scientific information. Many people assume that they can access such information privately.

This book addresses the topic of querying...

Automata, Languages and Programming: 31st International Colloquium, ICALP 2004, Turku, Finland, July 12-16, 2004, Proceedings
Automata, Languages and Programming: 31st International Colloquium, ICALP 2004, Turku, Finland, July 12-16, 2004, Proceedings
This book constitutes the refereed proceedings of the 31st International Colloquium on Automata, Languages and Programming, ICALP 2004, held in Turku, Finland, in July 2004.

The 97 revised full papers presented together with abstracts of 6 invited talks were carefully reviewed and selected from 379 submissions. The papers address all current...

Logics in Artificial Intelligence: European Workshop, JELIA 2000 Malaga, Spain, September 29 - October 2, 2000 Proceedings
Logics in Artificial Intelligence: European Workshop, JELIA 2000 Malaga, Spain, September 29 - October 2, 2000 Proceedings
This book constitutes the refereed proceedings of the European Workshop on Logics in Artificial Intelligence, JELIA 2000, held in Malaga, Spain in September/October 2000. The 24 revised full papers presented together with three invited papers were carefully reviewed and selected out of 60 submissions. The papers are organized in topical sections on...
Parsing Techniques: A Practical Guide (Monographs in Computer Science)
Parsing Techniques: A Practical Guide (Monographs in Computer Science)
Parsing, also referred to as syntax analysis, has been and continues to be an essential part of computer science and linguistics. Today, parsing techniques are also implemented in a number of other disciplines, including but not limited to, document preparation and conversion, typesetting chemical formulae, and chromosome recognition.

This...

Introduction to Assembly Language Programming: For Pentium and RISC Processors (Texts in Computer Science)
Introduction to Assembly Language Programming: For Pentium and RISC Processors (Texts in Computer Science)
Assembly language continues to hold a core position in the programming world because of its similar structure to machine language and its very close links to underlying computer-processor architecture and design. These features allow for high processing speed, low memory demands, and the capacity to act directly on the system's hardware. This...
Economics of Identity Theft: Avoidance, Causes and Possible Cures
Economics of Identity Theft: Avoidance, Causes and Possible Cures
Today, identity is more than anything, economic. The technology used to create, utilize and protect identities is increasingly ill-matched to the economics and uses of identities. Identity theft is the misuse of private authenticating information to steal money. Protecting identity requires privacy. Proving identity requires exposing information....
Result Page: 377 376 375 374 373 372 371 370 369 368 367 366 365 364 363 362 361 360 359 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy