Home | Amazing | Today | Tags | Publishers | Years | Search 
Group-based Cryptography (Advanced Courses in Mathematics - CRM Barcelona)
Group-based Cryptography (Advanced Courses in Mathematics - CRM Barcelona)

This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, and complexity theory. It is explored how non-commutative (infinite) groups, which are typically studied in combinatorial group theory, can be used in public key cryptography. It is also shown...

Cluster Analysis for Data Mining and System Identification
Cluster Analysis for Data Mining and System Identification

Data clustering is a common technique for statistical data analysis, which is used in many fields, including machine learning, data mining, pattern recognition, image analysis and bioinformatics. Clustering is the classification of similar objects into different groups, or more precisely, the partitioning of a data set into subsets...

Computational Intelligence in Optimization: Applications and Implementations (Adaptation, Learning, and Optimization)
Computational Intelligence in Optimization: Applications and Implementations (Adaptation, Learning, and Optimization)

Optimization is an integral part to science and engineering. Most real-world applications involve complex optimization processes, which are difficult to solve without advanced computational tools. With the increasing challenges of fulfilling optimization goals of current applications there is a strong drive to advance the development of...

Evolving Fuzzy Systems - Methodologies, Advanced Concepts and Applications
Evolving Fuzzy Systems - Methodologies, Advanced Concepts and Applications

In today’s real-world applications, there is an increasing demand of integrating new information and knowledge on-demand into model building processes to account for changing system dynamics, new operating conditions, varying human behaviors or environmental influences.

Evolving fuzzy systems (EFS) are a powerful tool...

Coding for Data and Computer Communications
Coding for Data and Computer Communications

On the evening of 23 June 1995, the well-known painter Franz Hutting (not his real name) sent a digitized copy of his latest masterpiece Barricade from his studio in New York to his friend Percival Bartlebooth in Paris. In itself, this data transmission was not different from the millions of other, similar transmissions taking place all over...

Exploratory Data Analysis with MATLAB (Chapman & Hall/CRC Computer Science & Data Analysis)
Exploratory Data Analysis with MATLAB (Chapman & Hall/CRC Computer Science & Data Analysis)

Exploratory data analysis (EDA) was conceived at a time when computers were not widely used, and thus computational ability was rather limited. As computational sophistication has increased, EDA has become an even more powerful process for visualizing and summarizing data before making model assumptions to generate hypotheses, encompassing...

Mathematical Optimization in Computer Graphics and Vision (The Morgan Kaufmann Series in Computer Graphics)
Mathematical Optimization in Computer Graphics and Vision (The Morgan Kaufmann Series in Computer Graphics)

Mathematical optimization is used in nearly all computer graphics applications, from computer vision to animation. This book teaches readers the core set of techniques that every computer graphics professional should understand in order to envision and expand the boundaries of what is possible in their work.

Study of this
...

Automatic Digital Document Processing and Management: Problems, Algorithms and Techniques
Automatic Digital Document Processing and Management: Problems, Algorithms and Techniques

This text reviews the issues involved in handling and processing digital documents. Examining the full range of a document’s lifetime, the book covers acquisition, representation, security, pre-processing, layout analysis, understanding, analysis of single components, information extraction, filing, indexing and retrieval. Features:...

Data Mining and Knowledge Discovery via Logic-Based Methods: Theory, Algorithms, and Applications
Data Mining and Knowledge Discovery via Logic-Based Methods: Theory, Algorithms, and Applications

There are many approaches to data mining and knowledge discovery (DM&KD), including neural networks, closest neighbor methods, and various statistical methods. This monograph, however, focuses on the development and use of a novel approach, based on mathematical logic, that the author and his research associates have worked on over the...

Prescribing for Elderly Patients
Prescribing for Elderly Patients

As our population ages, clinicians are faced with an increasing number of elderly patients with multiple medical problems and prescribed medications both in the acute and in the chronic setting. The clinical presentation of common conditions often differs from other age groups and the risk of drug–drug interactions is high, leading to...

Professional Parallel Programming with C#: Master Parallel Extensions with .NET 4
Professional Parallel Programming with C#: Master Parallel Extensions with .NET 4

In 2007, Microsoft released the fi rst Community Technology Preview (CTP) of Parallel Extensions for the .NET Framework. The old .NET Framework multithreading programming model was too complex and heavyweight for the forthcoming multicore and manycore CPUs. I had been researching parallel programming, multiprocessor, and multicore since 1997,...

Discrete Mathematics (4th Edition)
Discrete Mathematics (4th Edition)

Today an increasing proportion of the applications of mathematics involves discrete rather than continuous models. The main reason for this trend is the integration of the computer into more and more of modem society. This book is intended for a one-semester introductory course in discrete mathematics.

Prerequisites Even though a...

Result Page: 199 198 197 196 195 194 193 192 191 190 189 188 187 186 185 184 183 182 181 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy