Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Linear Algebra and Probability for Computer Science Applications
Linear Algebra and Probability for Computer Science Applications

Based on the author’s course at NYU, Linear Algebra and Probability for Computer Science Applications gives an introduction to two mathematical fields that are fundamental in many areas of computer science. The course and the text are addressed to students with a very weak mathematical background. Most of the...

Probability and Statistics for Computer Scientists
Probability and Statistics for Computer Scientists

Student-Friendly Coverage of Probability, Statistical Methods, Simulation, and Modeling Tools
Incorporating feedback from instructors and researchers who used the previous edition, Probability and Statistics for Computer Scientists, Second Edition helps students understand general methods of stochastic
...

Software Test Attacks to Break Mobile and Embedded Devices (Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series)
Software Test Attacks to Break Mobile and Embedded Devices (Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series)

Address Errors before Users Find Them
Using a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of "smart" devices driven by software, the book
...

Elliptic Curves: Number Theory and Cryptography, Second Edition (Discrete Mathematics and Its Applications)
Elliptic Curves: Number Theory and Cryptography, Second Edition (Discrete Mathematics and Its Applications)
Over the last two or three decades, elliptic curves have been playing an increasingly important role both in number theory and in related fields such as cryptography. For example, in the 1980s, elliptic curves started being used in cryptography and elliptic curve techniques were developed for factorization and primality...
Healthcare Informatics: Improving Efficiency and Productivity
Healthcare Informatics: Improving Efficiency and Productivity

Healthcare Informatics: Improving Efficiency and Productivity examines the complexities involved in managing resources in our healthcare system and explains how management theory and informatics applications can increase efficiencies in various functional areas of healthcare services. Delving into data and project management...

Combinatorial Methods with Computer Applications (Discrete Mathematics and Its Applications)
Combinatorial Methods with Computer Applications (Discrete Mathematics and Its Applications)

Combinatorial Methods with Computer Applications provides in-depth coverage of recurrences, generating functions, partitions, and permutations, along with some of the most interesting graph and network topics, design constructions, and finite geometries. Requiring only a foundation in discrete mathematics, it can serve as the...

Temporal Data Mining (Chapman & Hall/CRC Data Mining and Knowledge Discovery)
Temporal Data Mining (Chapman & Hall/CRC Data Mining and Knowledge Discovery)

Temporal data mining deals with the harvesting of useful information from temporal data. New initiatives in health care and business organizations have increased the importance of temporal information in data today.

From basic data mining concepts to state-of-the-art advances, Temporal Data Mining covers...

Fusion of Neural Networks, Fuzzy Systems and Genetic Algorithms: Industrial Applications
Fusion of Neural Networks, Fuzzy Systems and Genetic Algorithms: Industrial Applications
Artificial neural networks can mimic the biological information-processing mechanism in - a very limited sense. Fuzzy logic provides a basis for representing uncertain and imprecise knowledge and forms a basis for human reasoning. Neural networks display genuine promise in solving problems, but a definitive theoretical basis does not yet exist for...
Isosurfaces: Geometry, Topology, and Algorithms
Isosurfaces: Geometry, Topology, and Algorithms

Ever since Lorensen and Cline published their paper on the Marching Cubes algorithm, isosurfaces have been a standard technique for the visualization of 3D volumetric data. Yet there is no book exclusively devoted to isosurfaces. Isosurfaces: Geometry, Topology, and Algorithms represents the first book to focus on basic...

Handbook Of Industrial Automation
Handbook Of Industrial Automation
"…an excellent handbook on automation for manufacturing or industrial engineering." -- Ergonomics in Design

"…provides the essential concepts and methods required for solving technical and managerial problems…. "…a well presented and comprehensive reference text." --
...
Trauma: Critical Care (Volume 2)
Trauma: Critical Care (Volume 2)

Compiled by internationally recognized experts in trauma critical care,this sourcediscusses the entire gamut of critical care management of the trauma patient and covers several common complications and conditions treated in surgical intensive care units that are not specifically related to trauma.  Utilizing evidence-based guidelines...

RFID Handbook: Applications, Technology, Security, and Privacy
RFID Handbook: Applications, Technology, Security, and Privacy
Radio Frequency Identification (RFID) tagging is now used by the department of defense and many of the worlds largest retailers including Wal-Mart. As RFID continues to infiltrate industries worldwide, organizations must harness a clear understanding of this technology in order to maximize its potential and protect against the potential risks it...
Result Page: 98 97 96 95 94 93 92 91 90 89 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy