Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Quantum Medicinal Chemistry (Methods and Principles in Medicinal Chemistry, Vol. 17)
Quantum Medicinal Chemistry (Methods and Principles in Medicinal Chemistry, Vol. 17)
Everyone relies on the power of computers, including chemical and pharmaceutical laboratories. Increasingly faster and more exact simulation algorithms have made quantum chemistry a valuable tool in the search for bioactive substances. The much larger computational cost is more than compensated by a deeper understanding of...
Social Computing, Behavioral-Cultural Modeling and Prediction: 6th International Conference, SBP 2013, Washington, DC, USA, April 2-5, 2013, Proceedings (Lecture Notes in Computer Science)
Social Computing, Behavioral-Cultural Modeling and Prediction: 6th International Conference, SBP 2013, Washington, DC, USA, April 2-5, 2013, Proceedings (Lecture Notes in Computer Science)

This book constitutes the proceedings of the 6th International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction, SBP 2013, held in Washington, DC, USA in April 2013. The total of 57 contributions, which consists of papers and posters, included in this volume was carefully reviewed and selected from 137 submissions....

Computation and Reasoning: A Type Theory for Computer Science (International Series of Monographs on Computer Science)
Computation and Reasoning: A Type Theory for Computer Science (International Series of Monographs on Computer Science)
"The best logic of our time is to be found in computer science departments....Computer scientists (many of whom are former logicians) are developing the logic that really matters, the one that really meets the challenges of today's demands for automated reasoning. This book is a prime example of such triumph of useful logic." --The...
Post Quantum Cryptography
Post Quantum Cryptography
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature...
Partial Differential Equations: Modelling and Numerical Simulation (Computational Methods in Applied Sciences)
Partial Differential Equations: Modelling and Numerical Simulation (Computational Methods in Applied Sciences)
This book is dedicated to Olivier Pironneau.

For more than 250 years partial differential equations have been clearly the most important tool available to mankind in order to understand a large variety of phenomena, natural at first and then those originating from human activity and technological development. Mechanics, physics and their...

Domain Decomposition Methods in Science and Engineering XVIII (Lecture Notes in Computational Science and Engineering)
Domain Decomposition Methods in Science and Engineering XVIII (Lecture Notes in Computational Science and Engineering)

These are the proceedings of the 18th international conference on domain decomposition methods in science and engineering, held in Jerusalem, January 12-17, 2008. Domain decomposition methods are iterative methods for solving the often very large linear or nonlinear systems of algebraic equations that arise when various problems in...

Linguistic Structure Prediction (Synthesis Lectures on Human Language Technologies)
Linguistic Structure Prediction (Synthesis Lectures on Human Language Technologies)

A major part of natural language processing now depends on the use of text data to build linguistic analyzers. We consider statistical, computational approaches to modeling linguistic structure. We seek to unify across many approaches and many kinds of linguistic structures. Assuming a basic understanding of natural language processing and/or...

Challenges for Computational Intelligence (Studies in Computational Intelligence)
Challenges for Computational Intelligence (Studies in Computational Intelligence)
In the year 1900 at the International Congress of Mathematicians in Paris David Hilbert delivered what is now considered the most important talk ever given in the history of mathematics. In this talk Hilbert outlined his philosophy of mathematics and proposed 23 major problems worth working at in future. Some of these problems were in fact more...
Computational Electromagnetics for RF and Microwave Engineering
Computational Electromagnetics for RF and Microwave Engineering
The numerical approximation of Maxwell's equations, Computational Electromagnetics (CEM), has emerged as a crucial enabling technology for radio-frequency, microwave and wireless engineering. The three most popular 'full-wave' methods - the Finite Difference Time Domain Method, the Method of Moments, and the Finite Element Method - are introduced...
Programming the Cell Processor: For Games, Graphics, and Computation
Programming the Cell Processor: For Games, Graphics, and Computation

Make the Most of IBM’s Breakthrough Cell Processor in Any Gaming, Graphics, or Scientific Application

 

IBM’s Cell processor delivers truly stunning computational power: enough to satisfy even the most demanding gamers and graphics...

Modern Data Science with R (Chapman & Hall/CRC Texts in Statistical Science)
Modern Data Science with R (Chapman & Hall/CRC Texts in Statistical Science)

Modern Data Science with R is a comprehensive data science textbook for undergraduates that incorporates statistical and computational thinking to solve real-world problems with data. Rather than focus exclusively on case studies or programming syntax, this book illustrates how statistical programming in the...

2D Object Detection and Recognition: Models, Algorithms, and Networks
2D Object Detection and Recognition: Models, Algorithms, and Networks
This book is about detecting and recognizing 2D objects in gray-level images. Howare
models constructed? Howare they trained? What are the computational approaches to
efficient implementation on a computer? And finally, how can some of these computations
be implemented in the framework of parallel and biologically plausible neural...
unlimited object storage image
Result Page: 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy