Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security in Ad-hoc and Sensor Networks (Computer and Network Security)
Security in Ad-hoc and Sensor Networks (Computer and Network Security)

Ad hoc and sensor networks continue to have a growing impact on communication. These cost-effective wireless networks provide location independent computing in environments ranging from military battlefields to in-home patient monitoring systems. However, having real-time connectivity to critical information over an open...

An Introduction To Black Holes, Information And The String Theory Revolution: The Holographic Universe
An Introduction To Black Holes, Information And The String Theory Revolution: The Holographic Universe
.,." This well-planned, stimulating and sometimes provocative book can be enthusiastically recommended.?

Over the last decade the physics of black holes has been revolutionized by developments that grew out of Jacob Bekenstein s realization that black holes have entropy. Stephen Hawking raised profound issues concerning
...
The Legacy of Albert Einstein: A Collection of Essays in Celebration of the Year of Physics
The Legacy of Albert Einstein: A Collection of Essays in Celebration of the Year of Physics
"In this slender volume, about a dozen experts reflect succinctly on a variety of currently interesting topics, from black hole entropy in string theory to the challenge of dark energy. The book should interest primarily graduate students in physics and also some undergraduates ... is a fine reflection of the internationalism of modern science...
Recent Advances In Data Mining Of Enterprise Data: Algorithms and Applications (Series on Computers and Operations Research)
Recent Advances In Data Mining Of Enterprise Data: Algorithms and Applications (Series on Computers and Operations Research)

The main goal of the new field of data mining is the analysis of large and complex datasets. Some very important datasets may be derived from business and industrial activities. This kind of data is known as enterprise data . The common characteristic of such datasets is that the analyst wishes to analyze them for the purpose of designing a...

Data Mining In Time Series Databases (Series in Machine Perception and Artificial Intelligence)
Data Mining In Time Series Databases (Series in Machine Perception and Artificial Intelligence)
Traditional data mining methods are designed to deal with “static” databases, i.e. databases where the ordering of records (or other database objects) has nothing to do with the patterns of interest. Though the assumption of order irrelevance may be sufficiently accurate in some applications, there are certainly many other cases, where...
The Practical Bioinformatician
The Practical Bioinformatician
Computer scientists have increasingly been enlisted as "bioinformaticians" to assist molecular biologists in their research. This book is a practical introduction to bioinformatics for these computer scientists. The chapters are in-depth discussions by expert bioinformaticians on both general techniques and specific approaches to a range...
Derived Langlands: Monomial Resolutions of Admissible Representations (Series on Number Theory and Its Applications)
Derived Langlands: Monomial Resolutions of Admissible Representations (Series on Number Theory and Its Applications)
The Langlands Programme is one of the most important areas in modern pure mathematics. The importance of this volume lies in its potential to recast many aspects of the programme in an entirely new context. For example, the morphisms in the monomial category of a locally p–adic Lie group have a distributional description, due...
The Mathematical Foundation of Informatics
The Mathematical Foundation of Informatics
The first international conference organized in Vietnam, which concerns theoretical computer science, was the ICOMIDC Symposium on Mathematics of Computation, held in Ho Chi Minh City in 1988. For the last years great developments have been made in this areas. Therefore, it had become necessary to organize in Vietnam another international...
Fighting Terror in Cyberspace (Series in Machine Perception & Artifical Intelligence)
Fighting Terror in Cyberspace (Series in Machine Perception & Artifical Intelligence)
The Internet, or the ARPANET in its original name, was a remarkable idea. The Net was designed in the late 60's by US ARPA (Advanced Research Projects Agency) to connect distant computers to each other. This was a critical need at a time when each computer was a precious resource of computing power, which, if connected, could be shared among...
Intelligent Virtual World: Technologies and Applications in Distributed Virtual Environment
Intelligent Virtual World: Technologies and Applications in Distributed Virtual Environment
In the last few years we have observed an explosive growth of multimedia computing, communication and applications. Thls revolution is transforming the way people live, work, and interact with each other, and is impacting the way business, government services, education, entertainment, and health care are operating. Yet, several issues related to...
Graph -Theoretic Techniques for Web Content Mining (Machine Perception and Artificial Intelligence)
Graph -Theoretic Techniques for Web Content Mining (Machine Perception and Artificial Intelligence)
Graphs are mathematical constructs for representing objects or systems which contain structural (i.e. relationship) information. Graphs have been used in many domains, from software engineering to artificial intelligence. However, the use of graphs in machine learning has been limited, compared to the more prevalent vector model which does not...
The Iterated Prisoners' Dilemma: 20 Years on (Advances in Natural Computation)
The Iterated Prisoners' Dilemma: 20 Years on (Advances in Natural Computation)
In 1984, Robert Axelrod reported the results of two iterated prisoner's dilemma (IPD) competitions [Axelrod (1984)]. The booked was to be a catalyst for much of the research in this area since that time. It is unlikely that you would write a scientific paper about IPD, without citing Axelrod's 1984 book. The book is even more remarkable in that it...
unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy