|
|
|
|
|
|
|
How to Do Everything with Your iMac, 4th Edition
The original idea of How to Do Everything with Your iMac was a simple one. The iMac is a complete computer with a wonderful bundle of applications that enable you to do just about anything you need a computer to do. So, I wanted my book on the iMac to be as comprehensive as possible, teaching the reader how to be productive while enjoying... | | Group-based Cryptography (Advanced Courses in Mathematics - CRM Barcelona)
This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, and complexity theory. It is explored how non-commutative (infinite) groups, which are typically studied in combinatorial group theory, can be used in public key cryptography. It is also shown... | | Introduction to Genetic Algorithms
The origin of evolutionary algorithmswas an attempt tomimic some of the processes taking place in natural evolution. Although the details of biological evolution are not completely understood (even nowadays), there exist some points supported by strong experimental evidence:
• Evolution is a process operating over chromosomes... |
|
|
Result Page: 2462 2461 2460 2459 2458 2457 2456 2455 2454 2453 2452 2451 2450 2449 2448 2447 2446 2445 2444 |