Home | Amazing | Today | Tags | Publishers | Years | Search 
Phase Transitions in Machine Learning
Phase Transitions in Machine Learning

From its inception in the 1930s, the rich and vigorous field of computer science has been concerned with the resources, both in time and in memory, needed to carry out a computation. A number of fundamental theorems were discovered that resorted to a worst-case analysis. The central question was whether a given algorithm could be...

Recent Trends and Developments in Social Software: International Conferences on Social Software
Recent Trends and Developments in Social Software: International Conferences on Social Software

From its beginnings, the Internet has fostered communication, collaboration and networking between users. However, the first boom at the turn of the millennium was mainly driven by a rather one-sided interaction: e-commerce, portal sites and the broadcast models of mainstream media were introduced to theWeb. Over the last six or seven...

Modern Cryptology: A Tutorial (Lecture Notes in Computer Science)
Modern Cryptology: A Tutorial (Lecture Notes in Computer Science)

The present work grew out of lecture notes I prepared for a Vh hour tutorial that I was invited to give at the 29th IEEE Computer Conference (CompCon) in San Francisco on February 27, 1987. I have just completed a substantial update of the material, including the addition of several topics. My main purpose is to provide a...

High-Performance Computing: 6th International Symposium, ISHPC 2005, Nara, Japan, September 7-9, 2005
High-Performance Computing: 6th International Symposium, ISHPC 2005, Nara, Japan, September 7-9, 2005

This is the joint post-proceedings of the 6th International Symposium on High Performance Computing (ISHPC-VI) and the First International Workshop on Advanced Low Power Systems 2006 (ALPS2006). The post-proceedings also contain the papers presented at the Second HPF International Workshop: Experiences and Progress (HiWEP2005) and the...

XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts
XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts

Game consoles have evolved to become complex computer systems that may contain evidence to assist in a criminal investigation. From networking capabilities to chat, voicemail, streaming video and email, the game consoles of today are unrecognizable from complex computer systems. With over 10 million XBOX 360s sold in the United States the...

Data Analysis and Classification: Proceedings of the 6th Conference
Data Analysis and Classification: Proceedings of the 6th Conference

This volume contains revised versions of selected papers presented at the biennial meeting of the Classification and Data Analysis Group (CLADAG) of the Italian Statistical Society, which was held in Macerata, September 12–14, 2007. Carlo Lauro chaired the Scientific Programme Committee and Francesco Palumbo chaired the Local...

Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking

This book provides an overview of steganography and digital watermarking, two areas of research which are generally referred to as "information hiding." Steganography studies ways to make communication invisible by hiding secrets in innocuous messages, whereas watermarking originated from the need for copyright protection of...

Programming Microsoft ASP.NET 4
Programming Microsoft ASP.NET 4

In the fall of 2004, at a popular software conference I realized how all major component vendors were advertising their ASP.NET products using a new word—Ajax. Only a few weeks later, a brand new module in my popular ASP.NET master class made its debut—using Ajax to improve the user experience. At its core, Ajax is a little...

Software Engineering Techniques: Design for Quality
Software Engineering Techniques: Design for Quality

The aim of software engineering is to find methods for developing high quahty software products at a reasonable cost. As more and more computers are being used in areas in which a malfunction of the system can be a source of serious losses or disturbances to the functioning of the society, the quality of software becomes more and more...

Adobe Acrobat X for Windows and Macintosh: Visual QuickStart Guide
Adobe Acrobat X for Windows and Macintosh: Visual QuickStart Guide

You have to give Adobe credit. There aren’t many companies that have managed to change the world once, let alone twice. In 1985, Adobe introduced PostScript, which became the rock on which the entire electronic publishing industry was built; they forever changed the world of professional printing. In 1994, Adobe launched...

Better PowerPoint (R): Quick Fixes Based On How Your Audience Thinks
Better PowerPoint (R): Quick Fixes Based On How Your Audience Thinks

Presentations: We´ve all sat through them, wondering why we´re there; or we´ve given them, wondering whether the audience cares. This is a book about how to make presentations effective and therefore more interesting to the audience members.

Years ago, I was at a conference where one of the most...

Computability In Context: Computation and Logic in the Real World
Computability In Context: Computation and Logic in the Real World

Computability has played a crucial role in mathematics and computer science – leading to the discovery, understanding and classification of decidable/ undecidable problems, paving the way to the modern computer era and affecting deeply our view of the world. Recent new paradigms of computation, based on biological and physical...

Result Page: 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy