 |
|
 Theory and Practice of Uncertain ProgrammingReal-life decisions are usually made in the state of uncertainty (randomness, fuzziness, roughness, etc.). How do we model optimization problems in uncertain environments? How do we solve these models? In order to answer these questions, this book provides a self-contained, comprehensive and up-to-date presentation of uncertain programming theory.... |  |  Data Conversion Handbook (Analog Devices)Analog-to-digital (A/D) and digital-to-analog (D/A) converters provide the link between analog data produced by sensors and transducers (links to the real world, from microphones and video cameras to radar speed guns) and the digital data of signal processing, computing and other digital data collection or data processing systems. This complete... |  |  Pattern Recognition in Medical ImagingMedical Imaging has become one of the most important visualization and interpretation methods in biology and medecine over the past decade. This time has witnessed a tremendous development of new, powerful instruments for detecting, storing, transmitting, analyzing, and displaying medical images. This has led to a huge growth in the application of... |
|
 |  |  |  |  The Best Damn IT Security Management Book PeriodThis chapter will address vulnerabilities and why they are important. It also discusses a concept known as Windows of Vulnerability, and shows how to determine the risk a given vulnerability poses to your environment.
What Are Vulnerabilities?
So, what are... |
|
|
|
Result Page: 2282 2281 2280 2279 2278 2277 2276 2275 2274 2273 2272 2271 2270 2269 2268 2267 2266 2265 2264 |