Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Stochastic Modeling and Analysis of Telecoms Networks
Stochastic Modeling and Analysis of Telecoms Networks

This book addresses the stochastic modeling of telecommunication networks, introducing the main mathematical tools for that purpose, such as Markov processes, real and spatial point processes and stochastic recursions, and presenting a wide list of results on stability, performances and comparison of systems.
The authors propose a
...

Advances in Statistical Methods for the Health Sciences: Applications to Cancer and AIDS Studies, Genome Sequence Analysis, and Survival Analysis (Statistics for Industry and Technology)
Advances in Statistical Methods for the Health Sciences: Applications to Cancer and AIDS Studies, Genome Sequence Analysis, and Survival Analysis (Statistics for Industry and Technology)

Statistical methods have become an increasingly important and integral part of research in the health sciences. Many sophisticated methodologies have been developed for specific applications and problems. This self-contained comprehensive volume covers a wide range of topics pertaining to new statistical methods in the health sciences,...

Big and Complex Data Analysis: Methodologies and Applications (Contributions to Statistics)
Big and Complex Data Analysis: Methodologies and Applications (Contributions to Statistics)

This volume conveys some of the surprises, puzzles and success stories in high-dimensional and complex data analysis and related fields. Its peer-reviewed contributions showcase recent advances in variable selection, estimation and prediction strategies for a host of useful models, as well as essential new developments in the field.

...

Relations and Kleene Algebra in Computer Science: 11th International Conference on Relational Methods in Computer Science, RelMiCS 2009, and 6th . . . ... Issues) (Lecture Notes in Computer Science)
Relations and Kleene Algebra in Computer Science: 11th International Conference on Relational Methods in Computer Science, RelMiCS 2009, and 6th . . . ... Issues) (Lecture Notes in Computer Science)
The book constitutes the joint refereed proceedings of the 11th International Conference on Relational Methods in Computer Science, RelMiCS 2009, and the 6th International Conference on Applications of Kleene Algebras, AKA 2009, held in Doha, Qatar in November 2009. The 22 revised full papers presented together with 2 invited papers were...
The Nile Development Game: Tug-of-War or Benefits for All?
The Nile Development Game: Tug-of-War or Benefits for All?

This book introduces an analytic framework constructed upon the iterated Prisoners' Dilemma game to model and analyze transboundary water interactions along the Nile River. It presents a thorough and in-depth analysis of the historical path through which conflict and cooperation have been generated among the Nile riparians over...

Evolutionary Computation and Complex Networks
Evolutionary Computation and Complex Networks
This book introduces the linkage between evolutionary computation and complex networks and the advantages of cross-fertilising ideas from both fields. Instead of introducing each field individually, the authors focus on the research that sits at the interface of both fields. The book is structured to address two questions: (1) how complex...
Error Correction Coding: Mathematical Methods and Algorithms
Error Correction Coding: Mathematical Methods and Algorithms
An unparalleled learning tool and guide to error correction coding

Error correction coding techniques allow the detection and correction of errors occurring during the transmission of data in digital communication systems. These techniques are nearly universally employed in modern communication systems, and are thus an important component of...

Linux Network Security (Administrator's Advantage Series)
Linux Network Security (Administrator's Advantage Series)

Linux networks are becoming more and more common, but security is often an overlooked issue. Unfortunately, in today’s environment all networks are potential hacker targets, from top-secret military research networks to small home LANs. Linux Network Security focuses on securing Linux in a networked environment, where the security...

Articulation and Intelligibility (Synthesis Lectures on Speech and Audio Processing)
Articulation and Intelligibility (Synthesis Lectures on Speech and Audio Processing)
This lecture is a review of what is known about modeling human speech recognition (HSR). A model is proposed, and data are tested against the model.

There seem to be a large number of theories, or points of view, on how human speech recognition functions, yet few of these theories are comprehensive. What is needed is a set of models that are...

Milestones in Matrix Computation: The selected works of Gene H. Golub with commentaries
Milestones in Matrix Computation: The selected works of Gene H. Golub with commentaries
At a meeting in Moscow in June 2005, Gil Strang suggested that there be a collection of Gene Golub's work to highlight his many important contributions to numerical analysis. The three of us were honored to undertake this pleasant task, with publication timed for February "29", 2007, the 75th anniversary of Gene's birth.

Gene
...
Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control
Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control
Prevent hacker exploits with this comprehensive implementation guide

You're ready to see through the misconceptions and misinformation about NAP/NAC that might come your way. Here is an excellent resource for uncovering the actual vulnerabilities and exploits that the various NAP/NAC types can address. You'll find...

Service Orient or Be Doomed!: How Service Orientation Will Change Your Business
Service Orient or Be Doomed!: How Service Orientation Will Change Your Business
Introducing service orientation as a vision and philosophy that can impact a business, this innovative new book equips the reader to:
  • Best use technology resources to meet goals
  • Unleash their "inner nerd" to embrace IT as part of their business as a whole
  • Address the "mother of all business...
unlimited object storage image
Result Page: 388 387 386 385 384 383 382 381 380 379 378 377 376 375 374 373 372 371 370 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy