Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Software Engineering with Reusable Components
Software Engineering with Reusable Components
The book provides the reader with a clear understanding of what software reuse is, where the problems are, what benefits to expect, the activities, and different forms of software reuse. The reader is also given an overview of what sofware components are, different kinds of components and compositions, a taxonomy thereof, and examples of successful...
Linear Programming: Foundations and Extensions (International Series in Operations Research & Management Science)
Linear Programming: Foundations and Extensions (International Series in Operations Research & Management Science)
Linear Programming: Foundations and Extensions is an introduction to the field of optimization. The book emphasizes constrained optimization, beginning with a substantial treatment of linear programming, and proceeding to convex analysis, network flows, integer programming, quadratic programming, and convex optimization.

The book is...

The Calculus of Computation: Decision Procedures with Applications to Verification
The Calculus of Computation: Decision Procedures with Applications to Verification
Computational logic is a fast-growing field with applications in artificial intelligence, constraint solving, and the design and verification of software and hardware systems. Written with graduate and advanced undergraduate students in mind, this textbook introduces computational logic from the foundations of first-order logic to state-of-the-art...
Geometry for Computer Graphics: Formulae, Examples and Proofs
Geometry for Computer Graphics: Formulae, Examples and Proofs
Geometry is the cornerstone of computer graphics and computer animation, and provides the framework and tools for solving problems in two and three dimensions. This may be in the form of describing simple shapes such as a circle, ellipse, or parabola, or complex problems such as rotating 3D objects about an arbitrary axis. Geometry for Computer...
Learning from Data Streams: Processing Techniques in Sensor Networks
Learning from Data Streams: Processing Techniques in Sensor Networks
Sensor networks consist of distributed autonomous devices that cooperatively monitor an environment. Sensors are equipped with capacities to store information in memory, process this information and communicate with their neighbors. Processing data streams generated from wireless sensor networks has raised new research challenges over the last few...
3D Imaging for Safety and Security (Computational Imaging and Vision)
3D Imaging for Safety and Security (Computational Imaging and Vision)
The past decades have seen significant improvements in 3D imaging where the related techniques and technologies have advanced to a mature state. These exciting developments have sparked increasing interest in industry and academia in the challenges and opportunities afforded by 3D sensing. As a consequence, the emerging area of safety and security...
A Classical Introduction to Cryptography Exercise Book
A Classical Introduction to Cryptography Exercise Book
This companion exercise and solution book to A Classical Introduction to Cryptography: Applications for Communications Security contains a carefully revised version of teaching material used by the authors and given as examinations to advanced-level students of the Cryptography and Security Lecture at EPFL from 2000 to mid-2005. A Classical...
Handbook of Geometric Computing: Applications in Pattern Recognition, Computer Vision, Neuralcomputing, and Robotics
Handbook of Geometric Computing: Applications in Pattern Recognition, Computer Vision, Neuralcomputing, and Robotics
Many computer scientists, engineers, applied mathematicians, and physicists use geometry theory and geometric computing methods in the design of perception-action systems, intelligent autonomous systems, and man-machine interfaces. This handbook brings together the most recent advances in the application of geometric computing for building such...
Parameterized Complexity Theory (Texts in Theoretical Computer Science. An EATCS Series)
Parameterized Complexity Theory (Texts in Theoretical Computer Science. An EATCS Series)
Parameterized complexity theory is a recent branch of computational complexity theory that provides a framework for a refined analysis of hard algorithmic problems. The central notion of the theory, fixed-parameter tractability, has led to the development of various new algorithmic techniques and a whole new theory of intractability. This book is a...
Algebraic Geometry and Geometric Modeling (Mathematics and Visualization)
Algebraic Geometry and Geometric Modeling (Mathematics and Visualization)
Algebraic Geometry and Geometric Modeling are two distinct domains of research, with few interactions up to now, though closely linked. On the one hand, Algebraic Geometry has developed an impressive theory targeting the understanding of geometric objects defined algebraically. On the other hand, Geometric Modeling is using every day, in practical...
Number Theory for Computing
Number Theory for Computing
There are many surprising connections between the theory of numbers, which is one of the oldest branches of mathematics, and computing and information theory. Number theory has important applications in computer organization and security, coding and cryptography, random number generation, hash functions, and graphics. Conversely, number theorists...
Fuzzy Probabilities: New Approach and Applications (Studies in Fuzziness and Soft Computing)
Fuzzy Probabilities: New Approach and Applications (Studies in Fuzziness and Soft Computing)
In probability and statistics we often have to estimate probabilities and parameters in probability distributions using a random sample. Instead of using a point estimate calculated from the data we propose using fuzzy numbers which are constructed from a set of confidence intervals. In probability calculations we apply constrained fuzzy arithmetic...
Result Page: 396 395 394 393 392 391 390 389 388 387 386 385 384 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy