Home | Amazing | Today | Tags | Publishers | Years | Search 
The Epidemiology of Schizophrenia
The Epidemiology of Schizophrenia
The aim of this book is to weave together the diverse threads of epidemiological research in schizophrenia into a single volume that captures the new and exciting themes that have been emerging over recent years. Diverse topics are juxtaposed to expose synergy and to reveal new avenues of work, while the power of the epidemiological...
Theories of Programming Languages
Theories of Programming Languages

This textbook is a broad but rigorous survey of the theoretical basis for the design, definition, and implementation of programming languages, and of systems for specifying and proving program behavior. It encompasses imperative and functional programming, as well as the ways of integrating these aspects into more general languages. Basic...

Automatic Sequences: Theory, Applications, Generalizations
Automatic Sequences: Theory, Applications, Generalizations

Combining concepts of mathematics and computer science, this book is about the sequences of symbols that can be generated by simple models of computation called "finite automata". Suitable for graduate students or advanced undergraduates, it starts from elementary principles and develops the basic theory. The study then progresses...

Digital Nets and Sequences: Discrepancy Theory and Quasi-Monte Carlo Integration
Digital Nets and Sequences: Discrepancy Theory and Quasi-Monte Carlo Integration

Indispensable for students, invaluable for researchers, this comprehensive treatment of contemporary quasi-Monte Carlo methods, digital nets and sequences, and discrepancy theory starts from scratch with detailed explanations of the basic concepts and then advances to current methods used in research. As deterministic versions of the Monte...

The Measure of All Minds: Evaluating Natural and Artificial Intelligence
The Measure of All Minds: Evaluating Natural and Artificial Intelligence

Are psychometric tests valid for a new reality of artificial intelligence systems, technology-enhanced humans, and hybrids yet to come? Are the Turing Test, the ubiquitous CAPTCHAs, and the various animal cognition tests the best alternatives? In this fascinating and provocative book, José Hernández-Orallo formulates major...

Action to Language via the Mirror Neuron System
Action to Language via the Mirror Neuron System

Mirror neurons may hold the brain's key to social interaction - each coding not only a particular action or emotion but also the recognition of that action or emotion in others. The Mirror System Hypothesis adds an evolutionary arrow to the story - from the mirror system for hand actions, shared with monkeys and chimpanzees, to the...

The Law and Economics of Cybersecurity
The Law and Economics of Cybersecurity

Cybersecurity is a leading national problem for which the market may fail to produce a solution because individuals often select less than optimal security levels in a world of positive transaction costs. The problem is compounded because the insecure networks extend far beyond the regulatory jurisdiction of any one nation or even coalition...

Algebraic Shift Register Sequences
Algebraic Shift Register Sequences

Pseudo-random sequences are essential ingredients of every modern digital communication system including cellular telephones, GPS, secure internet transactions and satellite imagery. Each application requires pseudo-random sequences with specific statistical properties. This book describes the design, mathematical analysis and implementation...

Advanced Data Converters
Advanced Data Converters

Need to get up to speed quickly on the latest advances in high performance data converters? Want help choosing the best architecture for your application? With everything you need to know about the key new converter architectures, this guide is for you. It presents basic principles, circuit and system design techniques and associated...

Foundations of Cryptography: Volume 1, Basic Tools (Vol 1)
Foundations of Cryptography: Volume 1, Basic Tools (Vol 1)

Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. This book presents a rigorous and systematic treatment of the foundational issues: defining cryptographic tasks and solving new cryptographic problems using existing tools. It focuses on the basic mathematical...

WLAN Positioning Systems: Principles and Applications in Location-Based Services
WLAN Positioning Systems: Principles and Applications in Location-Based Services

Describing the relevant detection and estimation theory, this detailed guide provides the background knowledge needed to tackle the design of practical WLAN positioning systems. It sets out key system-level challenges and design considerations in increasing positioning accuracy and reducing computational complexity, and it also examines...

Smart Products, Smarter Services: Strategies for Embedded Control
Smart Products, Smarter Services: Strategies for Embedded Control

Billions of smart connected products are changing the competitive landscape for business and the daily lives of consumers. This book analyzes the evolution of embedded product intelligence and the impact of smart products on the automotive, wireless, energy, residential and health industries. It considers the transformation of consumer...

Result Page: 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy