Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Frontiers in Intelligent Computing: Theory and Applications: Proceedings of the 7th International Conference on FICTA (2018), Volume 1 (Advances in Intelligent Systems and Computing)
Frontiers in Intelligent Computing: Theory and Applications: Proceedings of the 7th International Conference on FICTA (2018), Volume 1 (Advances in Intelligent Systems and Computing)

This book presents the proceedings of the 7th International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA 2018), held at Duy Tan University, Da Nang, Vietnam. The event brought together researchers, scientists, engineers, and practitioners to exchange new ideas and experiences in the domain of...

Grid Computing: Making The Global Infrastructure a Reality
Grid Computing: Making The Global Infrastructure a Reality
"A few years ago ‘The Grid’ emerged as one of the most important new developments in building the infrastructure for computational science in the 21st century. The tremendous enthusiasm for grid computing has led to an extremely rapid growth of our knowledge about how to make grids a reality. This is a timely book with...
Privacy, Security and Trust within the Context of Pervasive Computing
Privacy, Security and Trust within the Context of Pervasive Computing
Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the second international conference on Pervasive Computing. The workshop was held April18-23, 2004, in Vienna, Austria. The goal of the workshop was not to focus on specific, even novel mechanisms, but rather on the interfaces...
Automatic Program Development: A Tribute to Robert Paige
Automatic Program Development: A Tribute to Robert Paige
Automatic Program Development is a tribute to Robert Paige (1947-1999), our accomplished and respected colleague, and moreover our good friend, whose untimely passing was a loss to our academic and research community. We have collected the revised, updated versions of the papers published in his honor in the Higher-Order and Symbolic Computation...
Cosmology
Cosmology
This book is unique in the detailed, self-contained, and comprehensive treatment that it gives to the ideas and formulas that are used and tested in modern cosmological research. It divides into two parts, each of which provides enough material for a one-semester graduate course. The first part deals chiefly with the isotropic and homogeneous...
Introduction to Precise Numerical Methods, Second Edition
Introduction to Precise Numerical Methods, Second Edition
Now that powerful PCs and Macs are everywhere available, when solving a numerical problem, we should no longer be content with an indefinite answer, that is, an answer where the error bound is either unknown or a vague guess. This book’s software allows you to obtain your numerical answers to a prescribed number of correct decimal places. For...
Information and the History of Philosophy (Rewriting the History of Philosophy)
Information and the History of Philosophy (Rewriting the History of Philosophy)

In recent years the philosophy of information has emerged as an important area of research in philosophy. However, until now information’s philosophical history has been largely overlooked.

Information and the History of Philosophy is the first comprehensive investigation of the history of philosophical...

Efficient Secure Two-Party Protocols: Techniques and Constructions (Information Security and Cryptography)
Efficient Secure Two-Party Protocols: Techniques and Constructions (Information Security and Cryptography)

The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation – both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them...

Mining Intelligence and Knowledge Exploration: 7th International Conference, MIKE 2019, Goa, India, December 19–22, 2019, Proceedings (Lecture Notes in Computer Science, 11987)
Mining Intelligence and Knowledge Exploration: 7th International Conference, MIKE 2019, Goa, India, December 19–22, 2019, Proceedings (Lecture Notes in Computer Science, 11987)

This book constitutes the refereed conference proceedings of the 7th International Conference on Mining Intelligence and Knowledge Exploration, MIKE 2019, held in Goa, India, in December 2019.

The 31 full papers were carefully reviewed and selected from 83 submissions. The accepted papers were chosen on the basis of...

Intelligent Agents for Telecommunication Environments (Innovative Technology Series)
Intelligent Agents for Telecommunication Environments (Innovative Technology Series)
Mobile agents are program instances (or processes) capable of moving within the network under their own control. They consist of three parts: code, data state, and execution state. Migration of mobile agents takes place between hosts. These hosts execute the agents and provide functionality to them. This functionality includes communication with...
Partial Differential Equations in Fluid Dynamics
Partial Differential Equations in Fluid Dynamics
This book is concerned with partial differential equations applied to fluids problems in science and engineering. This work is designed for two potential audiences. First, this book can function as a text for a course in mathematical methods in fluid mechanics in non-mathematics departments or in mathematics service courses. The authors have taught...
Aspects of Soft Computing, Intelligent Robotics and Control (Studies in Computational Intelligence)
Aspects of Soft Computing, Intelligent Robotics and Control (Studies in Computational Intelligence)

Soft computing, as a collection of techniques exploiting approximation and tolerance for imprecision and uncertainty in traditionally intractable problems, has become very effective and popular especially because of the synergy derived from its components. The integration of constituent technologies provides complementary methods that allow...

unlimited object storage image
Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy