Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advances in Elastomers I: Blends and Interpenetrating Networks (Advanced Structured Materials)
Advances in Elastomers I: Blends and Interpenetrating Networks (Advanced Structured Materials)

This is the first volume of a two-volume work which summarizes in an edited format and in a fairly comprehensive manner many of the recent technical research accomplishments in the area of Elastomers. “Advances in Elastomers” discusses the various attempts reported on solving these problems from the point of view of the chemistry...

Wireless Networks and Security: Issues, Challenges and Research Trends (Signals and Communication Technology)
Wireless Networks and Security: Issues, Challenges and Research Trends (Signals and Communication Technology)

 “Wireless Networks and Security” provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in...

A Primer on Scientific Programming with Python (Texts in Computational Science and Engineering)
A Primer on Scientific Programming with Python (Texts in Computational Science and Engineering)

The book serves as a first introduction to computer programming of scientific applications, using the high-level Python language. The exposition is example and problem-oriented, where the applications are taken from mathematics, numerical calculus, statistics, physics, biology and finance. The book teaches "Matlab-style" and...

Meta-Programming and Model-Driven Meta-Program Development: Principles, Processes and Techniques (Advanced Information and Knowledge Processing)
Meta-Programming and Model-Driven Meta-Program Development: Principles, Processes and Techniques (Advanced Information and Knowledge Processing)

Meta-Programming and Model-Driven Meta-Program Development: Principles, Processes and Techniques presents an overall analysis of meta-programming, focusing on insights of meta-programming techniques, heterogeneous meta-program development processes in the context of model-driven, feature-based and transformative approaches.

...

Understanding Network Hacks: Attack and Defense with Python
Understanding Network Hacks: Attack and Defense with Python

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore...

Quantum Walks and Search Algorithms (Quantum Science and Technology)
Quantum Walks and Search Algorithms (Quantum Science and Technology)

This book addresses an interesting area of quantum computation called quantum walks, which play an important role in building quantum algorithms, in particular search algorithms. Quantum walks are the quantum analogue of classical random walks.

It is known that quantum computers have great power for searching unsorted databases....

Social Network-Based Recommender Systems
Social Network-Based Recommender Systems

This book introduces novel techniques and algorithms necessary to support the formation of social networks. Concepts such as link prediction, graph patterns, recommendation systems based on user reputation, strategic partner selection, collaborative systems and network formation based on ‘social brokers’ are presented. Chapters...

Transactions on Petri Nets and Other Models of Concurrency VIII (Lecture Notes in Computer Science)
Transactions on Petri Nets and Other Models of Concurrency VIII (Lecture Notes in Computer Science)

The 8th volume of ToPNoC contains revised and extended versions of a selection of the best workshop papers presented at the 33rd International Conference on Application and Theory of Petri Nets and Other Models of Concurrency (Petri Nets 2012). The 10 papers cover a diverse range of topics including model checking and system verification,...

Transactions on Pattern Languages of Programming III (Lecture Notes in Computer Science)
Transactions on Pattern Languages of Programming III (Lecture Notes in Computer Science)

The Transactions on Pattern Languages of Programming subline aims to publish papers on patterns and pattern languages as applied to software design, development, and use, throughout all phases of the software life cycle, from requirements and design to implementation, maintenance and evolution. The primary focus of this LNCS Transactions...

Side Bias: A Neuropsychological Perspective
Side Bias: A Neuropsychological Perspective

`Rather than being an esoteric aspect of brain function, lateralization is a fundamental characteristic of the vertebrate brain essential to a broad range of neural and behavioral processes.' Professor Lesley J. Rogers, Chapter 1 of Side Bias: A Neuropsychological Perspective. This volume contains 14 chapters from a...

Quality Assurance in Dialysis (Developments in Nephrology)
Quality Assurance in Dialysis (Developments in Nephrology)

In examining the preface of our first book, it is increases needed. The Deming philosophy empha­ apparent that the editorial comments made in sizes that quality is never fully achieved: process 1994 are even more pertinent in today's cost- improvement is never ending. constrained healthcare environment than when But, what is quality?...

The Treatment of Glomerulonephritis (Developments in Nephrology)
The Treatment of Glomerulonephritis (Developments in Nephrology)

Glomerulonephritis is one of the commonest causes of end-stage renal failure worldwide. Although there have been considerable advances in the management of renal failure by dialysis and transplantation, there has been relatively little progress in its prevention. This volume sets out to review current practice in the treatment of...

Result Page: 387 386 385 384 383 382 381 380 379 378 377 376 375 374 373 372 371 370 369 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy