Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python for Graph and Network Analysis (Advanced Information and Knowledge Processing)
Python for Graph and Network Analysis (Advanced Information and Knowledge Processing)

This research monograph provides the means to learn the theory and practice of graph and network analysis using the Python programming language. The social network analysis techniques, included, will help readers to efficiently analyze social data from Twitter, Facebook, LiveJournal, GitHub and many others at three levels of depth: ego,...

Dictionary of Computer Acronyms and Abbreviations: Plus File Name Extensions (Words R Us Computer Dictionaries) (Volume 2)
Dictionary of Computer Acronyms and Abbreviations: Plus File Name Extensions (Words R Us Computer Dictionaries) (Volume 2)
This Companion Volume to our Dictionary of Computer and Internet Terms (Vol.2) - Dictionary of Computer Acronyms and Abbreviations, has 4,300 terms. It also includes a section on file name extensions with 38,000 entries showing the most commonly used extensions and their association with various software systems. Volume 1 contains over 32,000...
Artificial Intelligence: First CCF International Conference, ICAI 2018, Jinan, China, August 9-10, 2018, Proceedings (Communications in Computer and Information Science)
Artificial Intelligence: First CCF International Conference, ICAI 2018, Jinan, China, August 9-10, 2018, Proceedings (Communications in Computer and Information Science)
This book constitutes the refereed proceedings of the First CCF International Conference on Artificial Intelligence, CCF-ICAI 2018, held in Jinan, China in August, 2018.  The 17 papers presented were carefully reviewed and selected from 82 submissions. The papers are organized in topical sections on unsupervised...
High Tech/High Touch: Technology and Our Search for Meaning
High Tech/High Touch: Technology and Our Search for Meaning
The one great megatrend of the new millennium. In this important and timely book encompassing the key trends of our time, John Naisbitt, the world's foremost social forecaster and bestselling author, takes us on a compelling and kaleidoscopic tour of our contemporary 'technology immersion' and our accelerated search for meaning. High...
Multi-Carrier and Spread Spectrum Systems
Multi-Carrier and Spread Spectrum Systems
Multi-Carrier and Spread Spectrum Systems describes and analyses the basic concepts of the combination of multi-carrier transmission with spread spectrum (MC-SS). The various architectures and the different detection strategies are examined in some depth. Techniques for capacity and flexibility enhancement of multi-carrier systems such as...
Police Technology: 21st-Century Crime-Fighting Tools (Law Enforcement and Intelligence Gathering)
Police Technology: 21st-Century Crime-Fighting Tools (Law Enforcement and Intelligence Gathering)

Computers have become vital for police work in the twenty-first century. Applications explored in this compelling volume include the capability of searching extensive, internationally synchronized criminal information databases; plotting crime incidents and patterns to anticipate and prevent recurrences; interrogating criminal suspects and...

Cryptographic  Boolean  Functions and Applications
Cryptographic Boolean Functions and Applications
Boolean functions are the building blocks of symmetric cryptographic systems. Symmetrical cryptographic algorithms are fundamental tools in the design of all types of digital security systems (i.e. communications, financial and e-commerce).

Cryptographic Boolean Functions and Applications is a concise reference that shows how Boolean
...
The All-New Switch Book: The Complete Guide to LAN Switching Technology
The All-New Switch Book: The Complete Guide to LAN Switching Technology
The much-anticipated update to the bestselling book on LAN switching

Since the publication of the first edition of The Switch Book seven years ago, LAN switching has witnessed significant changes, particularly in the areas of network layers, Ethernet, fast Ethernet, segmenting LANs, layer 3 switching, layer 4 switching, and multi-layer...

Quantum Computing and Communications: An Engineering Approach
Quantum Computing and Communications: An Engineering Approach
Quantum computers will revolutionize the way telecommunications networks function.

Quantum computing holds the promise of solving problems that would be intractable with conventional computers, by implementing principles from quantum physics in the development of computer hardware, software and communications equipment....

Information Security Management Handbook, Volume 7
Information Security Management Handbook, Volume 7

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding...

A Computational Introduction to Number Theory and Algebra
A Computational Introduction to Number Theory and Algebra
"This is an outstanding and well-written book whose aim is to introduce the reader to a broad range of material -- ranging from basic to relatively advanced -- without requiring any prior knowledge on the part of the reader other than calculus and mathematical maturity. That the book succeeds at this goal is quite an accomplishment! ...this...
Digital Communications
Digital Communications

This is a modern textbook on digital communications and is designed for senior undergraduate and graduate students, whilst also providing a valuable reference for those working in the telecommunications industry.  It provides a simple and thorough access to a wide range of topics through use of figures, tables, examples and problem...

Result Page: 143 142 141 140 139 138 137 136 135 134 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy