Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Tensors: The Mathematics of Relativity Theory and Continuum Mechanics
Tensors: The Mathematics of Relativity Theory and Continuum Mechanics
This book emerged from courses taught at the University College of Dublin, Carnegie-Mellon University and mostly at Simon Fraser University. This is a modern introduction to the theory of tensor algebra and tensor analysis. It discusses tensor algebra in Chapters 1 and 2. Differential manifold is introduced in Chapter 3. Tensor analysis,...
Topology Control in Wireless Ad Hoc and Sensor Networks
Topology Control in Wireless Ad Hoc and Sensor Networks
Topology control is fundamental to solving scalability and capacity problems in large-scale wireless ad hoc and sensor networks. 

Forthcoming wireless multi-hop networks such as ad hoc and sensor networks will allow network nodes to control the communication topology by choosing their transmitting...

Secure Coding: Principles and Practices
Secure Coding: Principles and Practices
Despite their myriad manifestations and different targets, nearly all attacks on computer systems have one fundamental cause: the code used to run far too many systems today is not secure. Flaws in its design, implementation, testing, and operations allow attackers all-too-easy access. Secure Coding: Principles &...
Dependability Benchmarking for Computer Systems (Practitioners)
Dependability Benchmarking for Computer Systems (Practitioners)

A comprehensive collection of benchmarks for measuring dependability in hardware-software systems

As computer systems have become more complex and mission-critical, it is imperative for systems engineers and researchers to have metrics for a system's dependability, reliability, availability, and serviceability....

Intelligent Wearable Interfaces
Intelligent Wearable Interfaces
This book introduces methodologies to develop a variety of intelligent wearable interfaces and covers practical implementations of systems for real-life applications. A number of novel intelligent wearable interface systems are examined, including network architecture for wearable robots, wearable interface for automatic language translation,...
The Singularity Is Near: When Humans Transcend Biology
The Singularity Is Near: When Humans Transcend Biology

Advance Praise For The Singularity is Near

"Ray Kurzweil is the best person I know at predicting the future of artificial intelligence. His intriguing new book envisions a future in which information technologies have advanced so far and fast that they enable humanity to transcend its biological
...

Modern Processor Design: Fundamentals of Superscalar Processors
Modern Processor Design: Fundamentals of Superscalar Processors
Modern Processor Design: Fundamentals of Superscalar Processors is an exciting new first edition from John Shen of Carnegie Mellon University And Intel and Mikko Lipasti of the University of Wisconsin--Madison. This book brings together the numerous microarchitectural techniques for harvesting more instruction-level parallelism (ILP) to...
A Computer Scientist's Guide to Cell Biology
A Computer Scientist's Guide to Cell Biology
This practical guide provides a succinct treatment of the general concepts of cell biology, furnishing the computer scientist with the tools necessary to read and understand current literature in the field.

The book explores three different facets of biology: biological systems, experimental methods, and language and...

Image-Based Modeling
Image-Based Modeling

“This book guides you in the journey of 3D modeling from the theory with elegant mathematics to applications with beautiful 3D model pictures. Written in a simple, straightforward, and concise manner, readers will learn the state of the art of 3D reconstruction and modeling.” —Professor Takeo Kanade, Carnegie Mellon...

Practical Data Science with R
Practical Data Science with R

Summary

Practical Data Science with R lives up to its name. It explains basic principles without the theoretical mumbo-jumbo and jumps right to the real use cases you'll face as you collect, curate, and analyze the data crucial to the success of your business. You'll apply the R programming language...

The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
A one-stop source of information covering everything you’ll need to know in order to pass the CISSP examination

The CISSP Prep Guide

From stolen intellectual proprietary and denial of service attacks to unauthorized use of critical resources and computer viruses, e-business companies face numerous threats each day that can...

Understanding Search Engines: Mathematical Modeling and Text Retrieval (Software, Environments, Tools), Second Edition
Understanding Search Engines: Mathematical Modeling and Text Retrieval (Software, Environments, Tools), Second Edition
“There is no other information retrieval/search book where the heart is the mathematical foundations. This book is greatly needed to further establish information retrieval as a serious academic, as well as practical and industrial, area." ---Jaime Carbonell, Carnegie Mellon University. “Berry and Browne describe most of what...
Result Page: 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy