Home | Amazing | Today | Tags | Publishers | Years | Search 
Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

Approximation Algorithms for NP-Hard Problems
Approximation Algorithms for NP-Hard Problems

Approximation algorithms have developed in response to the impossibility of solving a great variety of important optimization problems. Too frequently, when attempting to get a solution for a problem, one is confronted with the fact that the problem is NP-haid. This, in the words of Garey and Johnson, means "I can't find an...

Elements of ML Programming, ML97 Edition (2nd Edition)
Elements of ML Programming, ML97 Edition (2nd Edition)

I became interested in ML programming when I taught CS109, the introduc- tory Computer Science Foundations course at Stanford, starting in 1991. ML was used by several of the instructors of this course, including Stu Reges and Mike Cleron, to introduce concepts such as functional programming and type systems. It was also used for the...

GIS Basics
GIS Basics

Geographical Information Systems (GIS) are computer systems for storing, displaying and analyzing spatial data. The past twenty years have seen a rapid growth in their use in government, commerce and academia, and they can be used for managing a network of utilities, from handling census data through to planning the location of a new...

Graphical Models for Machine Learning and Digital Communication (Adaptive Computation and Machine Learning)
Graphical Models for Machine Learning and Digital Communication (Adaptive Computation and Machine Learning)

A variety of problems m machine learning and digital communication deal with complex but structured natural or artificial systems. Natural patterns mat we wish to automatically classify' are a consequence of a hierarchical causal physical process. Learning about the world m which we live requires mat we extract useful sensor)'...

Automata, Languages and Programming: 38th International Colloquium, ICALP 2011, Zurich, Switzerland
Automata, Languages and Programming: 38th International Colloquium, ICALP 2011, Zurich, Switzerland

ICALP 2011, the 38th edition of the International Colloquium on Automata, Languages and Programming, was held in Z¨urich, Switzerland, during July 4–8, 2011. ICALP is a series of annual conferences of the European Association for Theoretical Computer Science (EATCS) which first took place in 1972. This year, the ICALP...

Phase Transitions in Machine Learning
Phase Transitions in Machine Learning

From its inception in the 1930s, the rich and vigorous field of computer science has been concerned with the resources, both in time and in memory, needed to carry out a computation. A number of fundamental theorems were discovered that resorted to a worst-case analysis. The central question was whether a given algorithm could be...

Closed Object Boundaries from Scattered Points (Lecture Notes in Computer Science)
Closed Object Boundaries from Scattered Points (Lecture Notes in Computer Science)

This Ph.D. dissertation presents the result of research carried out between 1985 and 1992, first at Leiden University as a scientific assistant researcher, and later at CWI (Centre for Mathematics and Computer Science), Amsterdam, as a researcher on the NFI IIICAD project, funded by NWO (Dutch Organization for Scientific Research)...

Computers and Intractability: A Guide to the Theory of NP-Completeness (Series of Books in the Mathematical Sciences)
Computers and Intractability: A Guide to the Theory of NP-Completeness (Series of Books in the Mathematical Sciences)

Few technical lerms have gained such rapid notoriety as the appela tion "NP-complete." In the short lime since its introduction in the early 1970's, this term has come to symbolize the abyss of inherent intractability that algorithm designers increasingly face as they seek to solve larger and more complex problems. A...

Real-Time Embedded Systems: Optimization, Synthesis, and Networking
Real-Time Embedded Systems: Optimization, Synthesis, and Networking
Embedded systems are electronic systems that include a microprocessor to perform certain specific tasks. The microprocessor is embedded or hidden inside these products. Embedded systems are ubiquitous. Every week millions of tiny chips come out of factories like Freescale, Microchip, Philips, Texas Instruments, and Mitsubishi,...
Numerical Methods Using Matlab (Ellis Horwood Series in Mathematics & Its Applications)
Numerical Methods Using Matlab (Ellis Horwood Series in Mathematics & Its Applications)
Our primary aim is to introduce the render to a wide range of numerical algorithms, explain their fundamental principles and illustrate their application. The algorithms are implemented in the software package МАТ1.ЛН® because it provides a powerful tool to help with these studies.

Many
...
Human - Computer Systems Interaction: Backgrounds and Applications 2: Part 2 (Advances in Intelligent and Soft Computing)
Human - Computer Systems Interaction: Backgrounds and Applications 2: Part 2 (Advances in Intelligent and Soft Computing)
It is demonstrated that spectral characteristics of steady-state visual evoked potentials (SSVEPs) in a brain-computer interface (SSVEP-based BCI) depend significantly on the stimulus parameters, such as color and frequency of its flashing light. We postulate these dependencies can be used to improve the BCI performance –...
Result Page: 47 46 45 44 43 42 41 40 39 38 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy