Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

Think Complexity: Complexity Science and Computational Modeling
Think Complexity: Complexity Science and Computational Modeling
This book is inspired by boredom and fascination: boredom with the usual presentation of data structures and algorithms, and fascination with complex systems. The problem with data structures is that they are often taught without a motivating context; the problem with complexity science is that it is usually not taught at...
Biologics in General Medicine
Biologics in General Medicine

This is the first book to cover every angle in the clinical application of biologics. Readers will not only find that all of the biologics currently approved for clinical use are delineated in a standardized way, but also the "differential therapy" with biologics in fields including dermatology and neurology is described in detail...

Algorithms in Combinatorial Design Theory (Mathematics Studies)
Algorithms in Combinatorial Design Theory (Mathematics Studies)
Recent years have seen an explosive growth in research in combinatorics and graph theory. One primary factor in this rapid development has been the advent of computers, and the parallel study of practical and efficient algorithms. This volume represents an attempt to...
Quantum Computing Solutions: Solving Real-World Problems Using Quantum Computing and Algorithms
Quantum Computing Solutions: Solving Real-World Problems Using Quantum Computing and Algorithms
This chapter gives an overview of quantum solutions. You will see how quantum computing can be applied in real life. The problem and solutions are presented with the solution benefits. The solution benefits are automation, cost reduction and profit improvements, efficiency improvement, and defect reduction. The solutions...
Cryptography: A Very Short Introduction
Cryptography: A Very Short Introduction

We are surrounded by cryptography, from the ATM, where we withdraw cash, mobile phones, and the Internet, to workplace security systems that protect business secrets, and the civil and military codes that protect the skies above us.

In this fascinating introduction to how cryptography actually works, Fred Piper and Sean Murphy highlight...

Computational Intelligence, Theory and Applications: International Conference 8th Fuzzy Days in Dortmund, Germany, Sept. 29-Oct. 01, 2004
Computational Intelligence, Theory and Applications: International Conference 8th Fuzzy Days in Dortmund, Germany, Sept. 29-Oct. 01, 2004
This book constitutes the refereed proceedings of the 8th Dortmund Fuzzy Days, held in Dortmund, Germany, 2004. The Fuzzy-Days conference has established itself as an international forum for the discussion of new results in the field of Computational Intelligence. All the papers had to undergo a thorough review guaranteeing a solid quality of the...
High Performance Computing on Vector Systems 2005: Proceedings of the High Performance Computing Center Stuttgart, March 2005
High Performance Computing on Vector Systems 2005: Proceedings of the High Performance Computing Center Stuttgart, March 2005
In March 2005 about 40 scientists from Europe, Japan and the US came together the second time to discuss ways to achieve sustained performance on supercomputers in the range of Teraflops. The workshop held at the High Performance Computing Center Stuttgart (HLRS) was the second of this kind. The first one had been held in May 2004. At both...
Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks (Wiley Series on Parallel and Distributed Computing)
Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks (Wiley Series on Parallel and Distributed Computing)
Learn the fundamental algorithms and protocols for wireless and mobile ad hoc networks

Advances in wireless networking and mobile communication technologies, coupled with the proliferation of portable computers, have led to development efforts for wireless and mobile ad hoc networks. This book focuses on several aspects of wireless ad hoc...

Clustering (IEEE Press Series on Computational Intelligence)
Clustering (IEEE Press Series on Computational Intelligence)
Clustering has become an increasingly important topic in recent years, caused by the glut of data from a wide variety of disciplines. However, due to the lack of good communication among these communities, similar theories or algorithms are redeveloped many times, causing unnecessary waste of time and resources. Furthermore, different terminologies...
Data Mining: Practical Machine Learning Tools and Techniques, Third Edition
Data Mining: Practical Machine Learning Tools and Techniques, Third Edition

The convergence of computing and communication has produced a society that feeds on information. Yet most of the information is in its raw form: data. If data is characterized as recorded facts, then information is the set of patterns, or expectations, that underlie the data. There is a huge amount of information locked up in...

Fixed-Point Algorithms for Inverse Problems in Science and Engineering (Springer Optimization and Its Applications)
Fixed-Point Algorithms for Inverse Problems in Science and Engineering (Springer Optimization and Its Applications)

"Fixed-Point Algorithms for Inverse Problems in Science and Engineering" presents some of the most recent work from top-notch researchers studying projection and other first-order fixed-point algorithms in several areas of mathematics and the applied sciences. The material presented provides a survey of the state-of-the-art...

unlimited object storage image
Result Page: 186 185 184 183 182 181 180 179 178 177 176 175 174 173 172 171 170 169 168 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy