



Software Engineering with Reusable ComponentsThe book provides the reader with a clear understanding of what software reuse is, where the problems are, what benefits to expect, the activities, and different forms of software reuse. The reader is also given an overview of what sofware components are, different kinds of components and compositions, a taxonomy thereof, and examples of successful...     The Calculus of Computation: Decision Procedures with Applications to VerificationComputational logic is a fastgrowing field with applications in artificial intelligence, constraint solving, and the design and verification of software and hardware systems. Written with graduate and advanced undergraduate students in mind, this textbook introduces computational logic from the foundations of firstorder logic to stateoftheart... 

Geometry for Computer Graphics: Formulae, Examples and ProofsGeometry is the cornerstone of computer graphics and computer animation, and provides the framework and tools for solving problems in two and three dimensions. This may be in the form of describing simple shapes such as a circle, ellipse, or parabola, or complex problems such as rotating 3D objects about an arbitrary axis. Geometry for Computer...   Learning from Data Streams: Processing Techniques in Sensor NetworksSensor networks consist of distributed autonomous devices that cooperatively monitor an environment. Sensors are equipped with capacities to store information in memory, process this information and communicate with their neighbors. Processing data streams generated from wireless sensor networks has raised new research challenges over the last few...   3D Imaging for Safety and Security (Computational Imaging and Vision)The past decades have seen significant improvements in 3D imaging where the related techniques and technologies have advanced to a mature state. These exciting developments have sparked increasing interest in industry and academia in the challenges and opportunities afforded by 3D sensing. As a consequence, the emerging area of safety and security... 

A Classical Introduction to Cryptography Exercise BookThis companion exercise and solution book to A Classical Introduction to Cryptography: Applications for Communications Security contains a carefully revised version of teaching material used by the authors and given as examinations to advancedlevel students of the Cryptography and Security Lecture at EPFL from 2000 to mid2005. A Classical...     

Algebraic Geometry and Geometric Modeling (Mathematics and Visualization)Algebraic Geometry and Geometric Modeling are two distinct domains of research, with few interactions up to now, though closely linked. On the one hand, Algebraic Geometry has developed an impressive theory targeting the understanding of geometric objects defined algebraically. On the other hand, Geometric Modeling is using every day, in practical...   Number Theory for ComputingThere are many surprising connections between the theory of numbers, which is one of the oldest branches of mathematics, and computing and information theory. Number theory has important applications in computer organization and security, coding and cryptography, random number generation, hash functions, and graphics. Conversely, number theorists...   


Result Page: 396 395 394 393 392 391 390 389 388 387 386 385 384 