|
|
|
|
Web Page Recommendation Models: Theory and Algorithms (Synthesis Lectures on Data Management)
One of the application areas of data mining is the World Wide Web (WWW or Web), which serves as a huge, widely distributed, global information service for every kind of information such as news, advertisements, consumer information, financial management, education, government, e-commerce, health services, and many other information services.... | | Broadband Powerline Communications: Network DesignBroadband Powerline Communications: Network Design covers the applications of broadband PLC systems in low-voltage supply networks, a promising candidate for the realization of cost effective solutions for "last mile" communications networks. There are many activities surrounding the development and application of PLC technology... | | |
|
Hardware Acceleration of EDA Algorithms: Custom ICs, FPGAs and GPUs
This book deals with the acceleration of EDA algorithms using hardware platforms such as FPGAs and GPUs. Widely applied CAD algorithms are evaluated and compared for potential acceleration on FPGAs and GPUs. Coverage includes discussion of conditions under which it is preferable to use one platform over another, e.g., when an EDA problem has... | | Advanced Techniques in Knowledge Discovery and Data MiningData mining and knowledge discovery (DMKD) is a rapidly expanding field in computer science. It has become very important because of an increased demand for methodologies and tools that can help the analysis and understanding of huge amounts of data generated on a daily basis by institutions like hospitals, research laboratories, banks, insurance... | | Biometric System and Data Analysis: Design, Evaluation, and Data MiningBiometric systems are being used in more places and on a larger scale than ever before. As these systems mature, it is vital to ensure the practitioners responsible for development and deployment, have a strong understanding of the fundamentals of tuning biometric systems. The focus of biometric research over the past four decades has... |
|
Static Analysis of Software: The Abstract Interpretation (ISTE)
The existing literature currently available to students and researchers is very general, covering only the formal techniques of static analysis.
This book presents real examples of the formal techniques called "abstract interpretation" currently being used in various industrial fields: railway, aeronautics, space,... | | The Complete Guide to Software Testing
The Complete Guide to Software Testing Bill Hetzel Gain a new perspective to software testing as a life cycle activity, not merely as something that happens at the end of coding. This edition is completely revised and contains new chapters on testing methodologies including ANSI standard-based testing—a survey of testing practices. Dr.... | | Kali Linux: Assuring Security By Penetration Testing
Master the art of penetration testing with Kali Linux
Overview
-
Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
-
Explore the insights and importance of testing your corporate network systems before the hackers strike
-
Understand the...
|
|
Art of Java Web Development: Struts, Tapestry, Commons, Velocity, JUnit, Axis, Cocoon, InternetBeans, WebWork
A guide to the skills required for state-of-the-art web development, this book covers a variety of web development frameworks. The uses of the standard web API to create applications with increasingly sophisticated architectures are highlighted, and a discussion of the development of industry-accepted best practices for architecture is ... | | Parallel Evolutionary Computations (Studies in Computational Intelligence)"Parallel Evolutionary Computation" focuses on the aspects related to the parallelization of evolutionary computations, such as parallel genetic operators, parallel fitness evaluation, distributed genetic algorithms, and parallel hardware implementations, as well as on their impact on several applications.The book is divided into four... | | Trustworthy Computing: Analytical and Quantitative Engineering Evaluation"The book itself is a commendable achievement, and it deals with the security and software reliability theory in an integrated fashion with emphasis on practical applications to software engineering and information technology. It is an excellent and unique book and definitely a seminal contribution and first of its kind."
... |
|
|
Result Page: 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 |