The aim of this book is to introduce the reader to some of the best
techniques for data mining in bioinformatics in the hope that the reader
will build on them to make new discoveries on his or her own. The
book contains twelve chapters in four parts, namely, overview, sequence
and structure alignment, biological...
UNIX gateways introduce massive performance possibilities at a fraction of the price of dedicated proprietary appliances by performing network tasks entirely in software. With Cisco Systems routers dominating the Internet and enterprise networking and UNIX routing and gateway solutions spreading from within server farms and data...
This book constitutes the refereed proceedings of the 16th International Conference on Information Processing in Medical Imaging, IPMI'99, held in Visegrad, Hungary in June/July 1999.
The 24 revised full papers and the 28 posters presented have been carefully reviewed and selected from a total of 82 submissions. The volume addresses the...
The ARENA Workshop in Zeuthen was the first to combine extensively the fields of acoustic and radio detection techniques for high-energetic particle cascades from cosmic neutrino interactions. The articles in this volume comprise the latest research work which was presented by over 50 speakers from 10 countries. The wide coverage includes:...
Most Web developers pick up a book to learn how to use a language like JavaScript, looking for practical examples of how to get things done. The Book of JavaScript: A Practical Guide to Interactive Web Pages is plenty practical, and hits the mark as a reader-friendly and well-organized tutorial on JavaScript.
A unified framework for using today's most advanced signal processing techniques
Driven by the rapidly escalating capacity demands of emerging wireless systems, researchers havedeveloped a wide array of novel signal processing techniques for use in such systems. Now, twoleading researchers synthesize the field's vast new...
Your pen testing career begins here, with a solid foundation in essential skills and concepts
Penetration Testing Essentials provides a starting place for professionals and beginners looking to learn more about penetration testing for cybersecurity. Certification eligibility requires work experience—but before...
Mobile radio communications are evolving from pure telephony systems to multimedia platforms offering a variety of services ranging from simple file transfers and audio and video streaming, to interactive applications and positioning tasks. Naturally, these services have different constraints concerning data rate, delay, and...
"Machine Learning and Data Mining for Computer Security" provides an overview of the current state of research in machine learning and data mining as it applies to problems in computer security. This book has a strong focus on information processing and combines and extends results from computer security.
** Black & White edition ** VMware vSphere 5 Clustering Technical Deepdive zooms in on three key components of every VMware based infrastructure and is by no means a "how to" guide. It covers the basic steps needed to create a vSphere HA and vSphere DRS cluster and to implement vSphere Storage DRS. Even more important, it...
This multi-author, edited volume includes chapters which deal with both basic and highly complex applications. Glow discharge devices are now being used in very novel ways for the analysis of liquids and gases, including molecular species detection and identification, an area that was beyond the perceived scope of applicability just ten years...