Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Proof Complexity (Encyclopedia of Mathematics and its Applications)
Proof Complexity (Encyclopedia of Mathematics and its Applications)
Proof complexity is a rich subject drawing on methods from logic, combinatorics, algebra and computer science. This self-contained book presents the basic concepts, classical results, current state of the art and possible future directions in the field. It stresses a view of proof complexity as a whole entity rather than a collection of various...
Computer Graphics Through OpenGL®: From Theory to Experiments
Computer Graphics Through OpenGL®: From Theory to Experiments

COMPREHENSIVE COVERAGE OF SHADERS AND THE PROGRAMMABLE PIPELINE

From geometric primitives to animation to 3D modeling to lighting, shading and texturing, Computer Graphics Through OpenGL®: From Theory to Experiments is a comprehensive introduction to computer graphics which uses an active...

Coders: Who They Are, What They Think and How They Are Changing Our World
Coders: Who They Are, What They Think and How They Are Changing Our World

Facebook’s algorithms shaping the news. Uber’s cars flocking the streets. Revolution on Twitter and romance on Tinder. We live in a world constructed of computer code. Coders – software programmers – are the people who built it for us. And yet their worlds and minds are little known to outsiders.

...

Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations
Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations

“We are dropping cyber bombs. We have never done that before.”—U.S. Defense Department official

A new era of war fighting is emerging for the U.S. military. Hi-tech weapons have given way to hi tech in a number of instances recently:

A computer virus is unleashed that...

Artificial Intelligence in Health: First International Workshop, AIH 2018, Stockholm, Sweden, July 13-14, 2018, Revised Selected Papers (Lecture Notes in Computer Science (11326))
Artificial Intelligence in Health: First International Workshop, AIH 2018, Stockholm, Sweden, July 13-14, 2018, Revised Selected Papers (Lecture Notes in Computer Science (11326))
This book constitutes the refereed post-conference proceedings of the First International Workshop on Artificial Intelligence in Health, AIH 2018, in Stockholm, Sweden, in July 2018. This workshop consolidated the workshops CARE, KRH4C and AI4HC into a single event.

The 18 revised full papers included in this
...
Malicious Attack Propagation and Source Identification (Advances in Information Security)
Malicious Attack Propagation and Source Identification (Advances in Information Security)

This book covers and makes four major contributions:

1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks;

2) proposing a novel approach to identify rumor sources in time-varying networks;

3) developing a fast approach to identify...

Web, Artificial Intelligence and Network Applications: Proceedings of the Workshops of the 33rd International Conference on Advanced Information ... in Intelligent Systems and Computing (927))
Web, Artificial Intelligence and Network Applications: Proceedings of the Workshops of the 33rd International Conference on Advanced Information ... in Intelligent Systems and Computing (927))

The aim of the book is to provide latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of Web Computing, Intelligent Systems and Internet Computing.

 As the Web has become a major source of...

Using and Administering Linux: Volume 1: Zero to SysAdmin: Getting Started
Using and Administering Linux: Volume 1: Zero to SysAdmin: Getting Started

Become a Linux sysadmin and expert user of Linux, even with no previous Linux experience and learn to manage complex systems with ease.  Volume 1 of this three volume training course introduces operating systems in general and Linux in particular. It briefly explores the The Linux Philosophy for SysAdmins in preparation for the...

Internet of Things for Smart Cities: Technologies, Big Data and Security (SpringerBriefs in Electrical and Computer Engineering)
Internet of Things for Smart Cities: Technologies, Big Data and Security (SpringerBriefs in Electrical and Computer Engineering)

This book introduces the concept of smart city as the potential solution to the challenges created by urbanization. The Internet of Things (IoT) offers novel features with minimum human intervention in smart cities. This book describes different components of Internet of Things (IoT) for smart cities including sensor technologies,...

Computer-Assisted Language Learning: Concepts, Contexts and Practices (Apacall Book)
Computer-Assisted Language Learning: Concepts, Contexts and Practices (Apacall Book)
The APACALL Book Series covers a wide range of issues in computer-assisted language learning (CALL) and offers opportunities for CALL researchers and practitioners to engage in research and discussion on their areas of interest.This book explores various facets of CALL and presents the findings of recent work in CALL that are of direct relevance...
Python Deep Learning: Exploring deep learning techniques and neural network architectures with PyTorch, Keras, and TensorFlow, 2nd Edition
Python Deep Learning: Exploring deep learning techniques and neural network architectures with PyTorch, Keras, and TensorFlow, 2nd Edition

Learn advanced state-of-the-art deep learning techniques and their applications using popular Python libraries

Key Features

  • Build a strong foundation in neural networks and deep learning with Python libraries
  • Explore advanced deep learning techniques and their applications...
Mastering Reverse Engineering: Re-engineer your ethical hacking skills
Mastering Reverse Engineering: Re-engineer your ethical hacking skills

Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses.

Key Features

  • Analyze and improvise software and hardware with real-world examples
  • Learn advanced debugging and patching...
Result Page: 660 659 658 657 656 655 654 653 652 651 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy