Home | Amazing | Today | Tags | Publishers | Years | Search 
Closed Object Boundaries from Scattered Points (Lecture Notes in Computer Science)
Closed Object Boundaries from Scattered Points (Lecture Notes in Computer Science)

This Ph.D. dissertation presents the result of research carried out between 1985 and 1992, first at Leiden University as a scientific assistant researcher, and later at CWI (Centre for Mathematics and Computer Science), Amsterdam, as a researcher on the NFI IIICAD project, funded by NWO (Dutch Organization for Scientific Research)...

Computers and Intractability: A Guide to the Theory of NP-Completeness (Series of Books in the Mathematical Sciences)
Computers and Intractability: A Guide to the Theory of NP-Completeness (Series of Books in the Mathematical Sciences)

Few technical lerms have gained such rapid notoriety as the appela tion "NP-complete." In the short lime since its introduction in the early 1970's, this term has come to symbolize the abyss of inherent intractability that algorithm designers increasingly face as they seek to solve larger and more complex problems. A...

Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

Theory and Applications of Models of Computation: Third International Conference, TAMC 2006, Beijing, China
Theory and Applications of Models of Computation: Third International Conference, TAMC 2006, Beijing, China

In several practical circumstances we have to solve a problem whose instance is not a priori completely known. Situations of this kind occur in computer systems and networks management, in financial decision making, in robotics etc. Problems that have to be solved without a complete knowledge of the instance are called on-line...

Algorithms and Computation: 20th International Symposium, ISAAC 2009, Honolulu, Hawaii
Algorithms and Computation: 20th International Symposium, ISAAC 2009, Honolulu, Hawaii

The papers in this volume were presented at the 20th Annual International Symposium on Algorithms and Computation, held December 16–18, 2009, in Hawaii, USA. In response to the Call-for-Papers, 279 papers were submitted. Each paper received at least three reviews by either Program Committee members or experts selected by Program...

Think Complexity: Complexity Science and Computational Modeling
Think Complexity: Complexity Science and Computational Modeling
This book is inspired by boredom and fascination: boredom with the usual presentation of data structures and algorithms, and fascination with complex systems. The problem with data structures is that they are often taught without a motivating context; the problem with complexity science is that it is usually not taught at...
Data Clustering in C++: An Object-Oriented Approach (Chapman & Hall/CRC Data Mining and Knowledge Discovery Series)
Data Clustering in C++: An Object-Oriented Approach (Chapman & Hall/CRC Data Mining and Knowledge Discovery Series)
Data clustering is a highly interdisciplinary field whose goal is to divide a set of objects into homogeneous groups such that objects in the same group are similar and objects in different groups are quite distinct. Thousands of papers and a number of books on data clustering have been published over the past 50 years....
Numerical Methods Using Matlab (Ellis Horwood Series in Mathematics & Its Applications)
Numerical Methods Using Matlab (Ellis Horwood Series in Mathematics & Its Applications)
Our primary aim is to introduce the render to a wide range of numerical algorithms, explain their fundamental principles and illustrate their application. The algorithms are implemented in the software package МАТ1.ЛН® because it provides a powerful tool to help with these studies.

Many
...
Human - Computer Systems Interaction: Backgrounds and Applications 2: Part 2 (Advances in Intelligent and Soft Computing)
Human - Computer Systems Interaction: Backgrounds and Applications 2: Part 2 (Advances in Intelligent and Soft Computing)
It is demonstrated that spectral characteristics of steady-state visual evoked potentials (SSVEPs) in a brain-computer interface (SSVEP-based BCI) depend significantly on the stimulus parameters, such as color and frequency of its flashing light. We postulate these dependencies can be used to improve the BCI performance –...
Real-Time Embedded Systems: Optimization, Synthesis, and Networking
Real-Time Embedded Systems: Optimization, Synthesis, and Networking
Embedded systems are electronic systems that include a microprocessor to perform certain specific tasks. The microprocessor is embedded or hidden inside these products. Embedded systems are ubiquitous. Every week millions of tiny chips come out of factories like Freescale, Microchip, Philips, Texas Instruments, and Mitsubishi,...
Signal Processing for Remote Sensing
Signal Processing for Remote Sensing
Signal processing has been playing an increasingly important role in remote sensing, though most remote sensing literatures are concerned with remote sensing images. Many data received by remote sensors such as microwave and geophysical sensors, are signals or waveforms, which can be processed by analog and digital signal...
High-Performance Scientific Computing: Algorithms and Applications
High-Performance Scientific Computing: Algorithms and Applications

This book presents the state of the art in parallel numerical algorithms, applications, architectures, and system software. The book examines various solutions for issues of concurrency, scale, energy efficiency, and programmability, which are discussed in the context of a diverse range of applications. Features: includes contributions from...

Result Page: 47 46 45 44 43 42 41 40 39 38 37 36 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy