Home | Amazing | Today | Tags | Publishers | Years | Search 
Discrete Mathematics (4th Edition)
Discrete Mathematics (4th Edition)

Today an increasing proportion of the applications of mathematics involves discrete rather than continuous models. The main reason for this trend is the integration of the computer into more and more of modem society. This book is intended for a one-semester introductory course in discrete mathematics.

Prerequisites Even though a...

Artificial Intelligence: A Modern Approach (3rd Edition)
Artificial Intelligence: A Modern Approach (3rd Edition)

Artificial Intelligence (AI) is a big field, and this is a big book. We have tried to explore the full breadth of the field, which encompasses logic, probability, and continuous mathematics; perception, reasoning, learning, and action; and everything from microelectronic devices to robotic planetary explorers. The book is...

Learning Classifier Systems: 11th International Workshop, IWLCS 2008
Learning Classifier Systems: 11th International Workshop, IWLCS 2008

Learning Classifier Systems (LCS) constitute a fascinating concept at the intersection of machine learning and evolutionary computation. LCS’s genetic search, generally in combination with reinforcement learning techniques, can be applied to both temporal and spatial problem-solving and promotes powerful search in a wide variety of...

Animating with Stop Motion Pro
Animating with Stop Motion Pro

This book is designed to explore the history and technique of stop motion animation. The software is secondary and is in fact so easy to use and ingenious that it allows you to concentrate on the art instead of the technology. You will need to use a computer, a camera, and connectors, so let’s get these issues out of the way so we can...

ModSecurity Handbook
ModSecurity Handbook

ModSecurity Handbook is the definitive guide to ModSecurity, a popular open source web application firewall. Written by Ivan Ristic, who designed and wrote much of ModSecurity, this book will teach you everything you need to know to monitor the activity on your web sites and protect them from attack. Situated between your web sites and the...

Databases in Networked Information Systems: 7th International Workshop, DNIS 2011
Databases in Networked Information Systems: 7th International Workshop, DNIS 2011

Large-scale information systems in public utility services depend on computing infrastructure. Many research efforts are being made in related areas, such as cloud computing, sensor networks, mobile computing, high-level user interfaces and information accesses by Web users. Government agencies in many countries plan to launch...

Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-to-peer (P2P) has proven as a most successful way to produce large scale, reliable, and cost-effective applications, as illustrated for file sharing or VoIP. P2P storage is an emerging field of application which allows peers to collectively leverage their resources towards ensuring the reliability and availability of user...
Combinatorial Image Analysis: 14th International Workshop, IWCIA 2011
Combinatorial Image Analysis: 14th International Workshop, IWCIA 2011
This volume includes the articles presented at the 14th International Workshop on Combinatorial Image Analysis, IWCIA 2011, held in Madrid, Spain, May 23–25, 2011. The 13 previous meetings were held in Paris (France) 1991, Ube (Japan) 1992, Washington D.C. (USA) 1994, Lyon (France) 1995, Hiroshima (Japan) 1997, Madras...
Exim: The Mail Transfer Agent
Exim: The Mail Transfer Agent
Back in 1995, the central computing services at Cambridge University were running a variety of mail transfer agents, including Sendmail, Smail 3, and PP. Some years before, I had converted the systems whose mail I managed from Sendmail to Smail to make it easier to handle the special requir ements of the early 1990s...
Transactions on Data Hiding and Multimedia Security VI
Transactions on Data Hiding and Multimedia Security VI
This issue consists mainly of a Special Section on “Content Protection and Forensics” with four papers edited by Sabu Emmanuel, Mohan S. Kankanhalli, Shih-Fu Chang, Regunathan Radhakrishnan, Fulong Ma and Li Zhao. For a detailed introduction of these four papers, please refer to the Preface written by the organizers...
Mathematics for Multimedia
Mathematics for Multimedia

Beautiful mathematical ideas abound in multimedia software! Some are not encountered until late in undergraduate or even postgraduate study, whereas they can be appreciated and used much earlier. This book presents a few dozen such pearls, strung together by their ubiquity in many applications. It is based on the course Topics in...

Processor Microarchitecture: An Implementation Perspective (Synthesis Lectures on Computer Architecture)
Processor Microarchitecture: An Implementation Perspective (Synthesis Lectures on Computer Architecture)

Computers are at the heart of most activities nowadays. A processor is the central component of a computer, but nowadays, we can find processors embedded in many other components, such as game consoles, consumer electronic devices and cars, just to mention a few.

This lecture presents a thorough study of the microarchitecture...

Result Page: 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy