Home | Amazing | Today | Tags | Publishers | Years | Search 
Discrete Mathematics (Jones and Bartlett Books in Computer Science)
Discrete Mathematics (Jones and Bartlett Books in Computer Science)

This book is designed for an introductory course in discrete mathematics that serves a variety of majors, including mathematics, computer science, and engineering. The book is the outgrowth of a course at Portland State University that has evolved over 15 years from a course for upper-division students into a course for sophomores. The book...

Graphics and GUIs with MATLAB, Third Edition (Graphics & GUIs with MATLAB)
Graphics and GUIs with MATLAB, Third Edition (Graphics & GUIs with MATLAB)

MATLAB®, now the industry-standard engineering language for computation, analysis, and visualization, continues to evolve in its capabilities. Version 6.x incorporated several major improvements, including significant enhancements to its graphics features, such as transparencies, increased 3-D visualization, and an improved rendering...

Basics of MATLAB and Beyond
Basics of MATLAB and Beyond

MATLABä-the tremendously popular computation, numerical analysis, signal processing, data analysis, and graphical software package-allows virtually every scientist and engineer to make better and faster progress. As MATLAB's world-wide sales approach a half-million with an estimated four million users, it becomes a near necessity...

New Frontiers in Information and Software as Services: Service and Application Design Challenges in the Cloud
New Frontiers in Information and Software as Services: Service and Application Design Challenges in the Cloud

The increasing costs of creating and maintaining infrastructures for delivering services to consumers have led to the emergence of cloud based third party service providers renting networks, computation power, storage, and even entire software application suites. On the other hand, service customers demand competitive pricing, service level...

Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011
Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011

These are the proceedings of TCC 2011, the 8th Theory of Cryptography Conference, which was held in Brown University, Providence, RI, during March 28–30, 2011. The conference was sponsored by the International Association for Cryptologic Research (IACR). The General Chair was Anna Lysyanskaya.

The Program Committee,...

Genetic Algorithms + Data Structures = Evolution Programs
Genetic Algorithms + Data Structures = Evolution Programs

Genetic algorithms are founded upon the principle of evolution, i.e., survival of the fittest. Hence evolution programming techniques, based on genetic algorithms, are applicable to many hard optimization problems, such as optimization of functions with linear and nonlinear constraints, the traveling salesman problem, and problems of...

Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives
Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives

Often computers are viewed as machines that run algorithms. This view of computers covers a vast range of devices, from simple computers that perform limited and specific computations (for example, a computer found in a wristwatch) to supercomputers, which are groups of computers linked together in homogeneous and heterogeneous clusters and...

Image and Video Processing in the Compressed Domain
Image and Video Processing in the Compressed Domain

With more and more images and videos being available in the compressed format, researchers have started taking interest in the aspect of designing algorithms for different image operations directly in their domains of representation. This would not only avoid the inverse and forward transformation steps and potentially make the...

Core Concepts in Data Analysis: Summarization, Correlation and Visualization
Core Concepts in Data Analysis: Summarization, Correlation and Visualization

In this textbook, I take an unconventional approach to data analysis. Its contents are heavily influenced by the idea that data analysis should help in enhancing and augmenting knowledge of the domain as represented by the concepts and statements of relation between them. According to this view, two main pathways for data analysis are...

Bioinformatics: The Machine Learning Approach, Second Edition (Adaptive Computation and Machine Learning)
Bioinformatics: The Machine Learning Approach, Second Edition (Adaptive Computation and Machine Learning)

We have been very pleased, beyond our expectations, with the reception of the first edition of this book. Bioinformatics, however, continues to evolve very rapidly, hence the need for a new edition. In the past three years, fullgenome sequencing has blossomed with the completion of the sequence of the fly and the first draft of the...

Semantic Web for the Working Ontologist, Second Edition: Effective Modeling in RDFS and OWL
Semantic Web for the Working Ontologist, Second Edition: Effective Modeling in RDFS and OWL

Since the first edition of Semantic Web for the Working Ontologist came out in June 2008, we have been encouraged by the reception the book has received. Practitioners from a wide variety of industries— health care, energy, environmental science, life sciences, national intelligence, and publishing, to name a few—have told...

Design and Analysis of Randomized Algorithms: Introduction to Design Paradigms
Design and Analysis of Randomized Algorithms: Introduction to Design Paradigms

Randomization has become a standard approach in algorithm design. Efficiency and simplicity are the main features of randomized algorithms that often made randomization a miraculous springboard for solving complex problems in various applications. Especially in the areas of communication, cryptography, data management, and discrete...

Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy