Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Design and Analysis of Parallel Algorithms
The Design and Analysis of Parallel Algorithms

This text for students and professionals in computer science provides a valuable overview of current knowledge concerning parallel algorithms. These computer operations have recently acquired increased importance due to their ability to enhance the power of computers by permitting multiple processors to work on different parts of a problem...

Fuzzy Sets in Management, Economy & Marketing
Fuzzy Sets in Management, Economy & Marketing

The rapid changes that have taken place globally on the economic, social and business fronts characterized the 20th century. The magnitude of these changes has formed an extremely complex and unpredictable decision-making framework, which is difficult to model through traditional approaches. The main purpose of this book is to present the...

Neo4j High Performance
Neo4j High Performance

Design, build, and administer scalable graph database systems for your applications using Neo4j

About This Book

  • Explore the numerous components that provide abstractions for pretty much any functionality you need from your persistent graphs
  • Familiarize yourself with how to test the...
Beginning Java Data Structures and Algorithms: Sharpen your problem solving skills by learning core computer science concepts in a pain-free manner
Beginning Java Data Structures and Algorithms: Sharpen your problem solving skills by learning core computer science concepts in a pain-free manner

Though your application serves its purpose, it might not be a high performer. Learn techniques to accurately predict code efficiency, easily dismiss inefficient solutions, and improve the performance of your application.

Key Features

  • Explains in detail different algorithms and data...
Algorithmic Cryptanalysis (Cryptography and Network Security)
Algorithmic Cryptanalysis (Cryptography and Network Security)
Focusing on both private- and public-key cryptographic algorithms, this book describes algorithmic methods with cryptographically relevant examples. After introducing modern cryptography and elementary number theory and algebra, it covers linear algebra, sieving, brute force, algorithms based on the birthday paradox,...
Models in Hardware Testing: Lecture Notes of the Forum in Honor of Christian Landrault (Frontiers in Electronic Testing)
Models in Hardware Testing: Lecture Notes of the Forum in Honor of Christian Landrault (Frontiers in Electronic Testing)

Model based testing is the most powerful technique for testing hardware and software systems. Models in Hardware Testing describes the use of models at all the levels of hardware testing. The relevant fault models for nanoscaled CMOS technology are introduced, and their implications on fault simulation, automatic test pattern...

Introduction To Digital Signal Processing: Computer Musically Speaking
Introduction To Digital Signal Processing: Computer Musically Speaking

This book offers an introduction to digital signal processing (DSP) with an emphasis on audio signals and computer music. It covers the mathematical foundations of DSP, important DSP theories including sampling, LTI systems, the z-transform, FIR/IIR filters, classic sound synthesis algorithms, various digital effects, topics in time and...

Heuristic Search: Theory and Applications
Heuristic Search: Theory and Applications

Search has been vital to artificial intelligence from the very beginning as a core technique in problem solving. The authors present a thorough overview of heuristic search with a balance of discussion between theoretical analysis and efficient implementation and application to real-world problems. Current developments in search such as...

An Invitation to 3-D Vision: From Images to Geometric Models (Interdisciplinary Applied Mathematics)
An Invitation to 3-D Vision: From Images to Geometric Models (Interdisciplinary Applied Mathematics)
This book is intended to give students at the advanced undergraduate or introductory graduate level, and researchers in computer vision, robotics and computer graphics, a self-contained introduction to the geometry of three-dimensional (3- D) vision. This is the study of the reconstruction of 3-D models of objects from a...
Relational and Algebraic Methods in Computer Science: 13th International Conference, RAMiCS 2012, Cambridge, United Kingdom, September 17-21, 2012, Proceedings (Lecture Notes in Computer Science)
Relational and Algebraic Methods in Computer Science: 13th International Conference, RAMiCS 2012, Cambridge, United Kingdom, September 17-21, 2012, Proceedings (Lecture Notes in Computer Science)

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Relational and Algebraic Methods in Computer Science, RAMiCS 13, held in Cambridge, UK, in September 2012. The 23 revised full papers presented were carefully selected from 39 submissions in the general area of relational and...

R Deep Learning Essentials
R Deep Learning Essentials

Key Features

  • Harness the ability to build algorithms for unsupervised data using deep learning concepts with R
  • Master the common problems faced such as overfitting of data, anomalous datasets, image recognition, and performance tuning while building the models
  • Build models relating to neural...
Blockchain for Enterprise: Build scalable blockchain applications with privacy, interoperability, and permissioned features
Blockchain for Enterprise: Build scalable blockchain applications with privacy, interoperability, and permissioned features

Implement blockchain principles in your choice of domain using Ethereum

Key Features

  • Build permissioned enterprise-grade blockchain applications from scratch
  • Implement Blockchain-as-a-Service to enterprises in terms of deployment and security
  • Achieve...
unlimited object storage image
Result Page: 189 188 187 186 185 184 183 182 181 180 179 178 177 176 175 174 173 172 171 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy