Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cryptographic Hardware and Embedded Systems - CHES 2002: 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002
Cryptographic Hardware and Embedded Systems - CHES 2002: 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002
This book constitutes the thoroughly refereed post-proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2002, held in Redwood Shores, California, USA in August 2002.

The 41 revised full papers presented together with two invited contributions were carefully selected from 101 submissions during two...

A Concise Introduction to Data Compression (Undergraduate Topics in Computer Science)
A Concise Introduction to Data Compression (Undergraduate Topics in Computer Science)
Compressing data is an option naturally selected when faced with problems of high costs or restricted space. Written by a renowned expert in the field, this book offers readers a succinct, reader-friendly foundation to the chief approaches, methods and techniques currently employed in the field of data compression.

Part I presents the basic...

The C++ Standard Library: A Tutorial and Reference (2nd Edition)
The C++ Standard Library: A Tutorial and Reference (2nd Edition)

The Best-Selling C++ Resource

Now Updated for C++11

 

The C++ standard library provides a set of common classes and interfaces that greatly extend the core C++ language. The library, however, is not self-explanatory. To make full...

Java Number Cruncher: The Java Programmer's Guide to Numerical Computing
Java Number Cruncher: The Java Programmer's Guide to Numerical Computing

In Java Number Cruncher, author Ronald Mak explains how to spot-and how to avoid-the subtle programming miscues that can cause vexing calculation errors in your applications. An authority on mapping pure math to computer math, he explains how to use the often-overlooked computational features of...

The Cryptoclub: Using Mathematics to Make and Break Secret Codes
The Cryptoclub: Using Mathematics to Make and Break Secret Codes
Join the Cryptokids as they apply basic mathematics to make and break secret codes. This book has many hands-on activities that have been tested in both classrooms and informal settings. Classic coding methods are discussed, such as Caesar, substitution, Vigenère, and multiplicative ciphers as well as the modern RSA. Math topics covered...
Algorithms for Computer Algebra
Algorithms for Computer Algebra

Algorithms for Computer Algebra is the first comprehensive textbook to be published on the topic of computational symbolic mathematics. The book first develops the foundational material from modern algebra that is required for subsequent topics. It then presents a thorough development of modern computational algorithms for such...

Numerical Software with Result Verification
Numerical Software with Result Verification
This book constitutes the thoroughly refereed post-proceedings of the Dagstuhl Seminar 03041 on Numerical Software with Result Verification held at Dagstuhl Castle, Germany, in January 2003.

The 18 revised full papers presented were selected during two rounds of reviewing and improvements. The papers are organized in topical sections on...

A Mathematical Tapestry: Demonstrating the Beautiful Unity of Mathematics
A Mathematical Tapestry: Demonstrating the Beautiful Unity of Mathematics

This easy-to-read book demonstrates how a simple geometric idea reveals fascinating connections and results in number theory, the mathematics of polyhedra, combinatorial geometry, and group theory. Using a systematic paper-folding procedure it is possible to construct a regular polygon with any number of sides. This remarkable algorithm has...

VALU, AVX and GPU Acceleration Techniques for Parallel FDTD Methods
VALU, AVX and GPU Acceleration Techniques for Parallel FDTD Methods

This book introduces a general hardware acceleration technique that can significantly speed up finite difference time domain (FDTD) simulations and their applications to engineering problems without requiring any additional hardware devices. It provides detailed code demonstration and analysis to help readers get the step-by-step guidelines...

Global Positioning Systems, Inertial Navigation, and Integration
Global Positioning Systems, Inertial Navigation, and Integration

An updated guide to GNSS and INS, and solutions to real-world GPS/INS problems with Kalman filtering

Written by recognized authorities in the field, this second edition of a landmark work provides engineers, computer scientists, and others with a working familiarity with the theory and contemporary...

The Relational Model for Database Management: Version 2
The Relational Model for Database Management: Version 2
Today, if you have a well-designed database management system, you have the keys to the kingdom of data processing and decision support. That is why there now exists a prototype machine whose complete design is based on the relational model. Its arithmetic hardware is a quite minor part of thearchitecture. In fact, the old term "computer...
Business Math For Dummies
Business Math For Dummies
Business and mathematics — they just seem to go together. Of course, I could make a case for any topic to successfully mesh with math. Then again, I’m a bit prejudiced. But you have to agree that you can’t do much in the home or in the business or real estate worlds without a good, solid mathematical background.

I
...
unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy