|
|
|
|
Kalman Filtering: Theory and Practice Using MATLABFrom Reviews of the First Edition
"An authentic magnum opus worth much more than its weight in gold!" —IEEE Transactions on Automatic Control
The proven textbook on Kalman filtering—now fully updated, revised, and expanded
... | | Market Timing For Dummies (Business & Personal Finance)Want to improve your market timing so you can send your investment returns soaring? Market Timing For Dummies takes the guesswork out of developing a trading strategy and provides all of the tools you need to forecast, prepare for, and take advantage of market trends and changes.
This authoritative guide is packed with expert... | | Nanoscience: Nanobiotechnology and NanobiologyNanobiotechnology is a rapidly developing field of research. Ever more applications are emerging from all branches of nanobiotechnology in medicine, pharmacy, cosmetics, chemical and agro-industry. The book presents the basics, fundamental results and latest achievements of nanobiotechnological research. It extends as far as promising... |
|
|
Software Abstractions: Logic, Language, and Analysis
As a programmer working for Logica UK in London in the mid-1980’s, I became a passionate advocate of formal methods. Extrapolating from small successes with VDM and JSP, I was sure that widespread use of formal methods would bring an end to the software crisis.
One approach especially intrigued me. John Guttag and Jim... | | Getting Started with Greenplum for Big Data Analytics
Big Data started off as a technology buzzword rapidly growing into the headline agenda of several corporate strategies across industry verticals. With the amount of structured and unstructured data available to organizations exploding, analysis of these large data sets is increasingly becoming a key basis of competition, productivity growth,... | | Security for Multihop Wireless Networks
Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area... |
|
|
|
Result Page: 387 386 385 384 383 382 381 380 379 378 377 376 375 374 373 372 371 370 369 |