Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
An Introduction to Modeling and Simulation of Particulate Flows (Computational Science and Engineering)
An Introduction to Modeling and Simulation of Particulate Flows (Computational Science and Engineering)
The relatively recent increase in computational power available for mathematical modeling and simulation raises the possibility that modern numerical methods can play a significant role in the analysis of complex particulate flows. This introductory monograph focuses on basic models and physically based computational solution strategies for the...
Theories of Programming and Formal Methods: Essays Dedicated to Jifeng He on the Occasion of His 70th Birthday (Lecture Notes in Computer Science)
Theories of Programming and Formal Methods: Essays Dedicated to Jifeng He on the Occasion of His 70th Birthday (Lecture Notes in Computer Science)

This Festschrift volume, dedicated to He Jifeng on the occasion of his 70th birthday in September 2013, includes 24 refereed papers by leading researchers, current and former colleagues, who congratulated at a celebratory symposium held in Shanghai, China, in the course of the 10th International Colloquium on Theoretical Aspects of Computing,...

Laser Dermatology
Laser Dermatology

This book represents the most up-to-date description of the state of the art in laser and light source technology. After an initial chapter describing the latest understanding of laser physics and safety, subsequent chapters take up the laser treatment, respectively, of vascular lesions, pigmented lesions and tattoos, unwanted hair, ablative...

History of Wireless
History of Wireless
Important new insights into how various components and systems evolved

Premised on the idea that one cannot know a science without knowing its history, History of Wireless offers a lively new treatment that introduces previously unacknowledged pioneers and developments, setting a new standard for understanding the evolution of this important...

Film Production Theory (The Suny Series, Cultural Studies in Cinema/Video)
Film Production Theory (The Suny Series, Cultural Studies in Cinema/Video)
To all appearances, the business of cinema goes on as usual. Yes, movies are being made. The production lines in the studios keep churning out their images. The digital effects specialists stay up late at night to meet endless deadlines. Films open in Berlin or Cannes. Critics write their reviews. People talk about the latest releases at work or...
Etransformation in Governance: New Directions in Government and Politics
Etransformation in Governance: New Directions in Government and Politics

eTransformation in Governance: New Directions in Government and Politics is about transformation in government and governance due to the information society development. The book provides conceptual clarification of the e-transformation in governance, and presents empirical findings on the recent developments in Western countries. The...

Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

Biometric Recognition: Challenges and Opportunities
Biometric Recognition: Challenges and Opportunities

Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric...

Information Technology for Counterterrorism: Immediate Actions and Futures Possibilities
Information Technology for Counterterrorism: Immediate Actions and Futures Possibilities
Immediately following the events of September 11, 2001, the National Academies (including the National Academy of Sciences, the National Academy of Engineering, the Institute of Medicine, and the National Research Council) offered its services to the nation to formulate a scientific and technological response to the challenges posed by emerging...
Deadline Fitness: Tone Up and Slim Down When Every Minute Counts
Deadline Fitness: Tone Up and Slim Down When Every Minute Counts

When I moved to Los Angeles from the East Coast, I was thrilled to have the opportunity to work in the entertainment industry. As I was studying and building my fitness business, my day job was as an assistant account executive at a Beverly Hills public relations firm. I spent lots of time with up-and-comers as well as with the most...

Advances in Databases and Information Systems: 8th East European Conference, ADBIS 2004, Budapest
Advances in Databases and Information Systems: 8th East European Conference, ADBIS 2004, Budapest
This volume continues the series of proceedings of the annual ADBIS conferences in the field of advances in databases and information systems.

ADBIS, founded by the Moscow ACM SIGMOD Chapter, was extended into a regular East-European conference in 1996 to establish a forum for promoting interaction and
...
Applications of Information Systems to Homeland Security And Defense
Applications of Information Systems to Homeland Security And Defense
A range of threats in the areas of safety and security, from natural disasters to terrorism to conventional warfare, involve complex interactions that are beyond the scope and capabilities of traditional problem solving techniques. Applications of Information Systems to Homeland Security and Defense provides an overview of complex systems’...
unlimited object storage image
Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy