Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Probability and Statistics for Computer Scientists
Probability and Statistics for Computer Scientists

Student-Friendly Coverage of Probability, Statistical Methods, Simulation, and Modeling Tools
Incorporating feedback from instructors and researchers who used the previous edition, Probability and Statistics for Computer Scientists, Second Edition helps students understand general methods of stochastic
...

Global Networking, Communication and Culture: Conflict or Convergence?: Spread of ICT, Internet Governance, Superorganism Humanity and Global Culture (Studies in Systems, Decision and Control)
Global Networking, Communication and Culture: Conflict or Convergence?: Spread of ICT, Internet Governance, Superorganism Humanity and Global Culture (Studies in Systems, Decision and Control)
Pursuing an interdisciplinary approach, this book offers detailed insights into the empirical relationships between overall social key figures of states and cultures in the fields of information and communication technology (ICT) (digital divide/inequality), the economy, education and religion. Its goal is to bridge the ‘cultural...
Multi-Carrier and Spread Spectrum Systems
Multi-Carrier and Spread Spectrum Systems
Multi-Carrier and Spread Spectrum Systems describes and analyses the basic concepts of the combination of multi-carrier transmission with spread spectrum (MC-SS). The various architectures and the different detection strategies are examined in some depth. Techniques for capacity and flexibility enhancement of multi-carrier systems such as...
Approximate Iterative Algorithms
Approximate Iterative Algorithms

Iterative algorithms often rely on approximate evaluation techniques, which may include statistical estimation, computer simulation or functional approximation. This volume presents methods for the study of approximate iterative algorithms, providing tools for the derivation of error bounds and convergence rates, and for the optimal design of...

Scalable VoIP Mobility: Integration and Deployment
Scalable VoIP Mobility: Integration and Deployment
Today's businesses, big and small, are faced with the large scale restructuring concerning daily communications. Enterprises are moving from the standard wired telephony to wired and wireless communication via internet protocol (IP), Wi-Fi, and cellular services. With the stabilization of these networks and the availability of dual-mode handsets...
Internet Television
Internet Television
Internet television is the quintessential digital convergence medium, putting together television, telecommunications, the Internet, computer applications, games, and more. It is part of a historic move from individualized narrowband capacity, measured by kilobits per user, to one of broadband with a capacity of megabits per user. This move will...
Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics)
Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics)

Master Bayesian Inference through Practical Examples and Computation–Without Advanced Mathematical Analysis

 

Bayesian methods of inference are deeply natural and extremely powerful. However, most discussions of Bayesian inference rely...

Principles of Cybercrime
Principles of Cybercrime

We live in a digital age. The proliferation of digital technology, and the convergence of computing and communication devices, has transformed the way in which we socialise and do business. While overwhelmingly positive, there has also been a dark side to these developments. Proving the maxim that crime follows opportunity, virtually every...

Classification of Services in the Digital Economy
Classification of Services in the Digital Economy

The classification of services in the digital economy proves critical for doing business, but it appears to be a particularly complex regulatory matter that is based upon a manifold set of issues. In the context of the General Agreement on Trade in Services (GATS), when the services classification scheme was drafted in the early 1990s,...

Triple Play: Building the converged network for IP, VoIP and IPTV
Triple Play: Building the converged network for IP, VoIP and IPTV

“Triple Play”is a combination of Internet access, voice communication (telephony), and entertainment services such as IP television and video on demand.

The erosion of the traditional voice service, together with the ever-increasing competition between companies, is pushing the telecommunications industry...

LANs to WANs: The Complete Management Guide
LANs to WANs: The Complete Management Guide
This text addresses key network management challenges, showing professionals how to tie together incompatible LANs, meld legacy systems and LANs, extend the reach of LANs with wireless links, and protect information assets from various disaster scenarios.

Empowered by today’s high-performance computers interconnected over LANs and...

Subdivision Methods for Geometric Design: A Constructive Approach (The Morgan Kaufmann Series in Computer Graphics)
Subdivision Methods for Geometric Design: A Constructive Approach (The Morgan Kaufmann Series in Computer Graphics)
Subdivision is an exciting new area in computer graphics that allows a geometric shape to be modeled as the limit of a sequence of increasingly faceted polyhedra. Companies such as Pixar and Alias/Wavefront have made subdivision surfaces the basic building block for much of their computer graphics/modeling software. Assuming a background of basic...
Result Page: 21 20 19 18 17 16 15 14 13 12 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy