Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Problems & Solutions In Scientific Computing With C++ And Java Simulations
Problems & Solutions In Scientific Computing With C++ And Java Simulations
Scientific computing is a collection of tools, techniques and theories required to develop and solve mathematical models in science and engineering on a computer. The purpose of this book is to supply a collection of problems together with their detailed solution which will prove to be valuable to students as well as to research workers in the...
B2B Integration: A Practical Guide to Collaborative E-Commerce
B2B Integration: A Practical Guide to Collaborative E-Commerce
...this guide reveals the key elements of successful B2B integration and collaborative e-commercie by highlighting business needs, technologies and development strategies

Comprehensive guide reveals the key elements of successful B2B integration and collaborative e-commerce, by highlighting business needs, technologies,
...
Web-Based Learning: Men And Machines: Proceedings of the First International Conference on Web-Based Learning in China (ICWL 2002)
Web-Based Learning: Men And Machines: Proceedings of the First International Conference on Web-Based Learning in China (ICWL 2002)
Proceedings of the First Intl Conference on Web-Based Learning in China, held August 17-19, 2002 in Hong Kong. An up to date study of technical, pedagogical and managerial issues in Web-based learning. Softcover.

Nowadays, our society has entered into the information age, in which people intend to acquire the information as
...
Introduction to Quantum Mechanics: Schrodinger Equation And Path Integral
Introduction to Quantum Mechanics: Schrodinger Equation And Path Integral
... for all readers interested in specific aspects of perturbation methods, path integrals, and their applications in classical field theory, this book provides a valuable source for their studies. -- Mathematical Reviews

It will be useful for theoretical physicists who wish to enlarge their skill in quantum mechanics and for
...
New Trends in Software Process Modelling (Software Engineering and Knowledge Engineering)
New Trends in Software Process Modelling (Software Engineering and Knowledge Engineering)
Over the years, a variety of software process models have been designed to structure, describe and prescribe the software systems construction process. More recently, software process modelling is increasingly dealing with new challenges raised by the tests that the software industry has to face. This book addresses these new trends in software...
A FAREWELL TO ENTROPY: Statistical Thermodynamics Based on Information
A FAREWELL TO ENTROPY: Statistical Thermodynamics Based on Information
The principal message of this book is that thermodynamics and statistical mechanics will benefit from replacing the unfortunate, misleading and mysterious term entropy with a more familiar, meaningful and appropriate term such as information, missing information or uncertainty. This replacement would facilitate the interpretation of the driving...
Information Processing and Routing in Wireless Sensor Networks
Information Processing and Routing in Wireless Sensor Networks
Wireless sensor networks (WSNs) have become an important technology in the realization of many applications, including both simple event/phenomena monitoring applications and heavy-duty data streaming applications. While many systems are being developed, we focus on two fundamental operations: information processing and information routing. In the...
Trust and Security in Collaborative Computing (Computer and Network Security)
Trust and Security in Collaborative Computing (Computer and Network Security)
Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing one of the objectives for the next generation of the Internet. It includes the functions of data communication, resource sharing, group...
Basics of Contemporary Cryptography for IT Practitioners
Basics of Contemporary Cryptography for IT Practitioners
The aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical constructions. The themes are conveyed in a form that only requires a basic knowledge of mathematics, but the methods are described in sufficient detail to enable their computer implementation. The book describes the main techniques...
Steiner Tree Problems In Computer Communication Networks
Steiner Tree Problems In Computer Communication Networks
The Steiner tree problem is one of the most important combinatorial optimization problems. It has a long history that can be traced back to the famous mathematician Fermat (1601 1665). This book studies three significant breakthroughs on the Steiner tree problem that were achieved in the 1990s, and some important applications of Steiner tree...
Mobile And Wireless Networks Security: Proceedings of the MWNS 2008 Workshop Singapore 9 April 2008
Mobile And Wireless Networks Security: Proceedings of the MWNS 2008 Workshop Singapore 9 April 2008
Wireless and mobile networks have undergone a tremendous evolution since their start. This was mainly motivated by the need for connectivity everywhere, as exemplified by the philosophy of "always on" access. Mobile telephony was the first need felt by users, followed by the need for mobile Internet applications. Mobile telecommunications...
Advances in Chinese Spoken Language Processing
Advances in Chinese Spoken Language Processing
After decades of research activity, Chinese spoken language processing (CSLP) has advanced considerably both in practical technology and theoretical discovery. In this book, the editors provide both an introduction to the field as well as unique research problems with their solutions in various areas of CSLP. The contributions represent pioneering...
unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy