Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Formal Methods and Software Engineering: 6th International Conference on Formal Engineering Methods
Formal Methods and Software Engineering: 6th International Conference on Formal Engineering Methods
Formal engineering methods are changing the way that software systems are developed. With language and tool support, they are being used for automatic code generation, and for the automatic abstraction and checking of implementations. In the future, they will be used at every stage of development: requirements, specification,...
Communicating with XML
Communicating with XML
XML (Extensible Markup Language) is the lingua franca in contemporary networked environments. It is intended to support communication between software modules, particularly on the Web, as well as communication between people involved in developing new XML-based solutions. Developing the new solutions for a specifi c domain or...
Cryptology and Network Security: 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011
Cryptology and Network Security: 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011

It was a real pleasure to have taken part in organizing the 10th International Conference on Cryptography and Network Security (CANS 2011). It was held during December 10–12, 2011, at the International Asia Pacific Convention Center in Sanya, on the subtropical island of Hainan (China). CANS 2011 was sponsored by the National...

Logical Foundations for Rule-Based Systems (Studies in Computational Intelligence)
Logical Foundations for Rule-Based Systems (Studies in Computational Intelligence)

Thinking in terms of facts and rules is perhaps one of the most common ways of approaching problem definition and problem solving both in everyday life and under more formal circumstances. The best known set of rules, the Ten Commandments have been accompanying us since the times of Moses; the Decalogue proved to be simple but...

Multiparadigm Constraint Programming Languages (Cognitive Technologies)
Multiparadigm Constraint Programming Languages (Cognitive Technologies)

"Modeling" has become one of the primary concerns in modern Software Engineering. The reason is simple: starting development processes from clear and succinct models has proven to foster not only quality but also productivity. With the advance of modeling there also came a desire for automatic code generation from models....

Electronic Value Exchange: Origins of the VISA Electronic Payment System (History of Computing)
Electronic Value Exchange: Origins of the VISA Electronic Payment System (History of Computing)

Most anywhere in the developed world, I can use a small rectangular piece of plastic, issued to me by a bank I have never visited, to obtain local currency or purchase goods and services directly from a merchant. The cashier and I may not even speak a common language, and the face of my card may look quite different from those carried...

Modern Cryptology: A Tutorial (Lecture Notes in Computer Science)
Modern Cryptology: A Tutorial (Lecture Notes in Computer Science)

The present work grew out of lecture notes I prepared for a Vh hour tutorial that I was invited to give at the 29th IEEE Computer Conference (CompCon) in San Francisco on February 27, 1987. I have just completed a substantial update of the material, including the addition of several topics. My main purpose is to provide a...

Intelligent Systems: Approximation by Artificial Neural Networks (Intelligent Systems Reference Library)
Intelligent Systems: Approximation by Artificial Neural Networks (Intelligent Systems Reference Library)

This brief monograph is the first one to deal exclusively with the quantitative approximation by artificial neural networks to the identity-unit operator. Here we study with rates the approximation properties of the "right" sigmoidal and hyperbolic tangent artificial neural network positive linear operators. In particular we study...

Advanced Statistical Steganalysis (Information Security and Cryptography)
Advanced Statistical Steganalysis (Information Security and Cryptography)

Steganography and steganalysis, the hiding and detection of a covert payload within an innocent cover object, started to receive attention from the computer science, engineering, and mathematics communities in the 1990s. At first the problems were not clearly defined, but proper statistical foundations were proposed and mathematical...

Numerical Techniques for Chemical and Biological Engineers Using MATLAB®: A Simple Bifurcation Approach
Numerical Techniques for Chemical and Biological Engineers Using MATLAB®: A Simple Bifurcation Approach

This book has come about by chance.

The first author, Said Elnashaie, and his wife, Shadia Elshishini, moved next door to the second author, Frank Uhlig, and his family in 2000. The two families became good neighbors and friends. Their chats covered the usual topics and occasionally included random teaching, departmental, and...

Neural Networks: Computational Models and Applications (Studies in Computational Intelligence)
Neural Networks: Computational Models and Applications (Studies in Computational Intelligence)

Artificial neural networks, or simply called neural networks, refer to the various mathematical models of human brain functions such as perception, computation and memory. It is a fascinating scientific challenge of our time to understand how the human brain works. Modeling neural networks facilitates us in investigating the...

Introduction to Artificial Intelligence (Undergraduate Topics in Computer Science)
Introduction to Artificial Intelligence (Undergraduate Topics in Computer Science)

Artificial Intelligence (AI) has the definite goal of understanding intelligence and building intelligent systems. However, the methods and formalisms used on the way to this goal are not firmly set, which has resulted in AI consisting of a multitude of subdisciplines today. The difficulty in an introductory AI course lies in conveying...

Result Page: 395 394 393 392 391 390 389 388 387 386 385 384 383 382 381 380 379 378 377 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy