Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Kernel Methods for Pattern Analysis
Kernel Methods for Pattern Analysis
'Kernel methods form an important aspect of modern pattern analysis, and this book gives a lively and timely account of such methods. ... if you want to get a good idea of the current research in this field, this book cannot be ignored.' SIAM Review '... the book provides an excellent overview of this growing field. I highly recommend it to those...
Reasoning in Event-Based Distributed Systems (Studies in Computational Intelligence)
Reasoning in Event-Based Distributed Systems (Studies in Computational Intelligence)

Event-based distributed systems are playing an ever increasing role in areas such as enterprise management, information dissemination, finance, environmental monitoring and geo-spatial systems. Event-based processing originated with the introduction of Event-Condition-Action (ECA) rules to database systems in the 1980s. Since then,...

Principles of CAD/CAM/CAE
Principles of CAD/CAM/CAE

With the dramatic changes in computing power and wider availability of software tools for design and production, engineers are now using CAD/CAM/CAE systems for everyday tasks, not just for demonstrations. International competition, de- creased availability of skilled labor, and increased emphasis on quality are also forcing...

Algorithms and Architectures for Parallel Processing, Part II: 11th International Conference, ICA3PP 2011, Workshops, Melbourne, Australia, October
Algorithms and Architectures for Parallel Processing, Part II: 11th International Conference, ICA3PP 2011, Workshops, Melbourne, Australia, October

This two volume set LNCS 7016 and LNCS 7017 constitutes the refereed proceedings of the 11th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2011, held in Melbourne, Australia, in October 2011. The second volume includes 37 papers from one symposium and three workshops held together with ICA3PP 2011...

Self-* and P2P for Network Management: Design Principles and Case Studies (SpringerBriefs in Computer Science)
Self-* and P2P for Network Management: Design Principles and Case Studies (SpringerBriefs in Computer Science)

The network management community has been pushed towards the design of alternative management approaches able to support heterogeneity, scalability, reliability, and minor human intervention. The employment of self-* properties and Peer-To-Peer (P2P) are seen as promising alternatives, able to provide the sophisticated solutions required.

...
Molecular Electronics: Commercial Insights, Chemistry, Devices, Architecture and Programming
Molecular Electronics: Commercial Insights, Chemistry, Devices, Architecture and Programming

This book presents an in-depth discussion on molecular electronics in an easy-to-understand manner, aiming at chemists, computer scientists, surface scientists, physicists, and applied mathematicians. Lighter overviews are provided for the science-minded layperson and the high tech entrepreneur in this nanoscale science. The author has...

Complexity and Cryptography : An Introduction
Complexity and Cryptography : An Introduction
This book originated in a well-established yet constantly evolving course on
Complexity and Cryptography which we have both given to final year Mathematics
undergraduates at Oxford for many years. It has also formed part of an
M.Sc. course on Mathematics and the Foundations of Computer Science, and
has been the basis for a more
...
Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle
Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle
As “techies,” we embrace the ability to understand the technology behind how
and why things work, to a point beyond most other people’s interest. Usually
what drives our interest is curiosity, a curiosity very similar to that which we
experienced in childhood.

Curiosity comes in different shapes and sizes
...
Feedback Control of Computing Systems
Feedback Control of Computing Systems
A pioneering reference on control theory designed specifically for computer professionals

In today’s computerized economy, the profitability and availability of many businesses rely on a clear understanding of the dynamics of their computing systems, especially how they relate to changes in workloads and configuration. Frequent,...

An Introduction to Genetic Algorithms (Complex Adaptive Systems)
An Introduction to Genetic Algorithms (Complex Adaptive Systems)

Science arises from the very human desire to understand and control the world. Over the course of history, we
humans have gradually built up a grand edifice of knowledge that enables us to predict, to varying extents, the
weather, the motions of the planets, solar and lunar eclipses, the courses of diseases, the rise and fall
...

Computational Intelligence: Principles, Techniques and Applications
Computational Intelligence: Principles, Techniques and Applications
Computational Intelligence: Principles, Techniques and Applications presents both theories and applications of computational intelligence in a clear, precise and highly comprehensive style. The textbook addresses the fundamental aspects of fuzzy sets and logic, neural networks, evolutionary computing and belief networks. The...
Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase
Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase
"Today, databases house our 'information crown jewels', but database security is one of the weakest areas of most information security programs. With this excellent book, Ben-Natan empowers you to close this database security gap and raise your database security bar!" Bruce W. Moulton. CISO/VP, Fidelity Investments (1995 - 2001)...
unlimited object storage image
Result Page: 206 205 204 203 202 201 200 199 198 197 196 195 194 193 192 191 190 189 188 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy