Home | Amazing | Today | Tags | Publishers | Years | Search 
Information Security and Cryptology: 5th International Conference, Inscrypt 2009
Information Security and Cryptology: 5th International Conference, Inscrypt 2009

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2009, held in Beijing, China, in December 2009. The 22 revised full papers and 10 short papers presented were carefully reviewed and selected from 147 submissions. The papers are...

Python Algorithms: Mastering Basic Algorithms in the Python Language
Python Algorithms: Mastering Basic Algorithms in the Python Language

Python Algorithms explains the Python approach to algorithm analysis and design. Written by Magnus Lie Hetland, author of Beginning Python, this book is sharply focused on classical algorithms, but it also gives a solid understanding of fundamental algorithmic problem-solving...

Verification and Validation in Systems Engineering: Assessing UML/SysML Design Models
Verification and Validation in Systems Engineering: Assessing UML/SysML Design Models

Verification and validation represents an important process used for the quality assessment of engineered systems and their compliance with the requirements established at the beginning of or during the development cycle.

Debbabi and his coauthors investigate methodologies and techniques that can be employed for the automatic...

Bioinformatics: High Performance Parallel Computer Architectures (Embedded Multi-Core Systems)
Bioinformatics: High Performance Parallel Computer Architectures (Embedded Multi-Core Systems)

New sequencing technologies have broken many experimental barriers to genome scale sequencing, leading to the extraction of huge quantities of sequence data. This expansion of biological databases established the need for new ways to harness and apply the astounding amount of available genomic information and convert it into substantive...

Performance Analysis and Optimization of Multi-Traffic on Communication Networks
Performance Analysis and Optimization of Multi-Traffic on Communication Networks

Promptly growing demand for telecommunication services and information interchange has led to the fact that communication became one of the most dynamical branches of an infrastructure of a modern society. The book introduces to the bases of classical MDP theory; problems of a finding optimal САС in models are investigated and...

The Vibration Analysis Handbook
The Vibration Analysis Handbook

The physical movement or motion of a rotating machine is normally referred to as vibration. Since the vibration frequency and amplitude cannot be measured by sight or touch, a means must be employed to convert the vibration into a usable product that can be measured and analyzed. Electronics, mechanics, and chemical physics are closely...

The Art and Science of Digital Compositing, Second Edition
The Art and Science of Digital Compositing, Second Edition

*The classic reference, with over 25,000 copies in print, has been massively expanded and thoroughly updated to include state-of-the-art methods and 400+ all-new full color images!

At ILM, compositing is one of the most important tools we use. If you want to learn more, this excellent 2nd-edition is detailed with hundreds of
...

Adventures of a Currency Trader: A Fable about Trading, Courage, and Doing the Right Thing (Wiley Trading)
Adventures of a Currency Trader: A Fable about Trading, Courage, and Doing the Right Thing (Wiley Trading)

Praise for ADVENTURES of a CURRENCY TRADER

"A truly easy, unique, and enjoyable read! Rob has done it once again to teach us in the funniest way possible how not to make the most common trading mistakes. If you are tired of reading how-to books, this is perfect for you. I highly recommend this book to all traders....

Oracle Fusion Middleware Patterns
Oracle Fusion Middleware Patterns

Enterprise Architecture is seldom simplistic enough to be built on a single technology - it generally encompasses a wide array of technologies, including SOA, Identity Management, Business Intelligence, Performance Management, Web 2.0, Content Management, BPM, Distributed caching, Data Integration, and Application Server.

What are...

Digital Terrain Modeling: Acquisition, Manipulation And Applications
Digital Terrain Modeling: Acquisition, Manipulation And Applications

With its expanding array of applications in everything from biodiversity modeling to wireless communications, it's no wonder digital terrain modeling (DTM) - the electronic process of representing topography in three dimensions -- is a hot subject among engineers and geoscientists. This concise resource is the first truly complete guide...

Mike Meyers' CompTIA A Guide to Managing & Troubleshooting PCs Lab Manual, Third Edition
Mike Meyers' CompTIA A Guide to Managing & Troubleshooting PCs Lab Manual, Third Edition

Practice the IT Skills Essential for Your Success

  • 115+ lab exercises challenge you to solve problems based on realistic case studies
  • Step-by-step scenarios require you to think critically
  • Lab analysis tests measure your understanding of lab results
  • Key term quizzes help build...
Acne and Its Therapy (Basic and Clinical Dermatology)
Acne and Its Therapy (Basic and Clinical Dermatology)

Addressing one of the most commonly encountered conditions seen by the dermatologist, this source analyzes the pathophysiology, evaluation, diagnosis, clinical features, and control of acne. With full-color illustrations, this source delves into the available treatment options for difficult cases of acne and scarring and provides expert...

Result Page: 403 402 401 400 399 398 397 396 395 394 393 392 391 390 389 388 387 386 385 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy