




Quantum Walks and Search Algorithms (Quantum Science and Technology)
This book addresses an interesting area of quantum computation called quantum walks, which play an important role in building quantum algorithms, in particular search algorithms. Quantum walks are the quantum analogue of classical random walks.
It is known that quantum computers have great power for searching unsorted databases....   Kalman Filter Recent Advances and Applications
The discussion about the manned spacecraft program was initiated at NASA in 1959.
Only one year later, Dr. Kalman and Dr. Schmidt linked the linear Kalman filter and the
perturbation theory in order to obtain the KalmanSchmidt filter, currently known as the
extended Kalman filter. This approach would be implemented in 1961 using an...   An Introduction to the Analysis of Algorithms (2nd Edition)
Despite growing interest, basic information on methods and models for mathematically analyzing algorithms has rarely been directly accessible to practitioners, researchers, or students. An Introduction to the Analysis of Algorithms, Second Edition, organizes and presents that knowledge, fully... 

The Algorithm Design ManualMost of the professional programmers that I've encountered are not well prepared to tackle algorithm design problems. This is a pity, because the techniques of algorithm design form one of the core practical technologies of computer science. Designing correct, efficient, and implementable algorithms for realworld problems is a tricky...   Parallel Algorithm Derivation and Program TransformationTransformational programming and parallel computation are two emerging fields that may ultimately depend on each other for success. Perhaps because ad hoc programming on sequential machines is so straightforward, sequential programming methodology has had little impact outside the academic community, and transformational methodology has had little...   Cryptography and Public Key Infrastructure on the InternetCryptography and Public Key Infrastructure on the Internet provides a thorough overview of the subject. It explains how susceptible networks are to hacking and how cryptography can help. This comprehensive and practical guide covers:
* Public Key Infrastructures (PKIs); important when using cryptography in a large organisation, ... 

    Introduction to Information Theory and Data Compression, Second EditionAn effective blend of carefully explained theory and practical applications, this text imparts the fundamentals of both information theory and data compression. Although the two topics are related, this unique text allows either topic to be presented independently, and it was specifically designed so that the data compression section requires... 


Result Page: 47 46 45 44 43 42 41 40 39 38 