Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Software Engineering and Knowledge Engineering, Vol 2 Emerging Technologies
Handbook of Software Engineering and Knowledge Engineering, Vol 2 Emerging Technologies
The Handbook of Software Engineering and Knowledge Engineering is the first comprehensive handbook covering these two important areas that have become interwoven in recent years. Many international experts contribute to this Handbook. Each article is written in a way that a practitioner of software engineering and knowledge...
Digital Currency: An International Legal and Regulatory Compliance Guide
Digital Currency: An International Legal and Regulatory Compliance Guide

Digital or ‘virtual’ currencies pose significant challenges for government, financial and legal institutions because of their non-physical nature and their relative anonymity to physical currency. These attributes make this form of exchange extremely volatile and, at the same time, attractive to criminals. Many countries around...

Interactions Between Computational Intelligence and Mathematics Part 2 (Studies in Computational Intelligence)
Interactions Between Computational Intelligence and Mathematics Part 2 (Studies in Computational Intelligence)

This book presents recent research in the field of interaction between computational intelligence and mathematics. In the current technological age, we face the challenges of tackling very complex problems – in the usual sense, but also in the mathematical and theoretical computer science sense. However, even the most...

Understanding Enterprise SOA
Understanding Enterprise SOA
This book is for anyone in the business world or in the public sector who needs to make sense of the new emerging standards for virtually all major information technology decisions. For business professionals, this book is meant to explain and clarify—in business terms—the way web services and SOA work in a business setting. For IT...
Nearest Neighbor Search:: A Database Perspective (Series in Computer Science)
Nearest Neighbor Search:: A Database Perspective (Series in Computer Science)
From the reviews of the first edition:

"This monograph explores the way spatial database management systems aim at supporting queries that involve the space characteristics of the underlying data, and discusses query processing techniques for nearest neighbor queries. It provides both basic concepts and state-of-the-art results in...

Simple Tools and Techniques for Enterprise Risk Management (The Wiley Finance Series)
Simple Tools and Techniques for Enterprise Risk Management (The Wiley Finance Series)
Providing strategic direction for a business means understanding what drives the creation of value and what destroys it. This in turn means the pursuit of opportunities must entail comprehension of the risks to take and the risks to avoid. Hence to grow any business entails risk judgement and risk acceptance. A business’s ability to prosper...
Introduction to Reversible Computing (Chapman & Hall/CRC Computational Science)
Introduction to Reversible Computing (Chapman & Hall/CRC Computational Science)

Few books comprehensively cover the software and programming aspects of reversible computing. Filling this gap, Introduction to Reversible Computing offers an expanded view of the field that includes the traditional energy-motivated hardware viewpoint as well as the emerging application-motivated software approach.

...

The Neurobiological Basis of Suicide (Frontiers in Neuroscience)
The Neurobiological Basis of Suicide (Frontiers in Neuroscience)

With recent studies using genetic, epigenetic, and other molecular and neurochemical approaches, a new era has begun in understanding pathophysiology of suicide. Emerging evidence suggests that neurobiological factors are not only critical in providing potential risk factors but also provide a promising approach to develop more effective...

The Art of Computer Virus Research and Defense
The Art of Computer Virus Research and Defense

Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly...

Cooperation in Wireless Networks: Principles and Applications: Real Egoistic Behavior Is to Cooperate!
Cooperation in Wireless Networks: Principles and Applications: Real Egoistic Behavior Is to Cooperate!

Cooperation in Wireless Networks: Principles and Applications covers the underlying principles of cooperative techniques as well as several applications demonstrating the use of such techniques in practical systems. The work is written in a collaborative manner by several authors from Asia, America, and Europe. Twenty chapters introduce and...

Emerging Systems Approaches in Information Technologies: Concepts, Theories and Applications
Emerging Systems Approaches in Information Technologies: Concepts, Theories and Applications
Through a systematic view of technologies, researchers are now finding it less complicated to examine, predict, and explain complex interactions between fields such as engineering and computer science. Emerging Systems Approaches in Information Technologies: Concepts, Theories, and Applications presents innovative research findings...
The Trouble With Physics: The Rise of String Theory, The Fall of a Science, and What Comes Next
The Trouble With Physics: The Rise of String Theory, The Fall of a Science, and What Comes Next
In this illuminating book, the renowned theoretical physicist Lee Smolin argues that fundamental physics -- the search for the laws of nature -- losing its way. Ambitious ideas about extra dimensions, exotic particles, multiple universes, and strings have captured the public’s imagination -- and the imagination of experts. But these...
unlimited object storage image
Result Page: 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy