Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Analysis of Biological Networks (Wiley Series in Bioinformatics)
Analysis of Biological Networks (Wiley Series in Bioinformatics)
An introduction to biological networks and methods for their analysis

Analysis of Biological Networks is the first book of its kind to provide readers with a comprehensive introduction to the structural analysis of biological networks at the interface of biology and computer science. The book begins with a brief overview of biological networks...

Antiviral Drug Discovery for Emerging Diseases and Bioterrorism Threats
Antiviral Drug Discovery for Emerging Diseases and Bioterrorism Threats
Promising drug discovery efforts in the race to cure emerging diseases and thwart bioterrorism

It was not too long ago that scientists believed that the discovery of powerful antimicrobial agents and vaccines would lead to the eradication of viral diseases. A warning, however, of the looming threat of viral diseases on U.S. national security...

A Statistical Approach to Neural Networks for Pattern Recognition (Wiley Series in Computational Statistics)
A Statistical Approach to Neural Networks for Pattern Recognition (Wiley Series in Computational Statistics)
"The book provides an excellent introduction to neutral networks from a statistical perspective." (International Statistical Review, 2008)

"Successful connects logistic regression and linear discriminant analysis, thus making it critical reference and self-study guide for students and professionals alike in the...

Java Foundations: Introduction to Program Design and Data Structures (2nd Edition) (Lewis)
Java Foundations: Introduction to Program Design and Data Structures (2nd Edition) (Lewis)

Welcome to Java Foundations. This book is designed to serve as the primary resource for a two- or three-term introductory course sequence, ranging from the most basic programming concepts to the design and implementation of complex data structures. This unified approach makes the important introductory sequence more cohesive and...

Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations
Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations

“We are dropping cyber bombs. We have never done that before.”—U.S. Defense Department official

A new era of war fighting is emerging for the U.S. military. Hi-tech weapons have given way to hi tech in a number of instances recently:

A computer virus is unleashed that...

Android Database Programming
Android Database Programming
Today, we live in an increasingly data-centric and data-driven world. We live in a world where companies like Amazon track every item we view and every item we purchase so as to recommend similar products to us. We live in a world where companies like Google store every search query thrown at them so as to recommend better search queries in...
Programming Interactivity: A Designer's Guide to Processing, Arduino, and openFrameworks
Programming Interactivity: A Designer's Guide to Processing, Arduino, and openFrameworks

This is a book about creating physical interaction with computer systems. It focuses on designing hardware and programming for systems that use either physical input or physical feedback. This book has been a dream of mine since I was an art student beginning to create interactive installations and finding that there was no simple...

Using R for Data Management, Statistical Analysis, and Graphics
Using R for Data Management, Statistical Analysis, and Graphics

Quick and Easy Access to Key Elements of Documentation
Includes worked examples across a wide variety of applications, tasks, and graphics

Using R for Data Management, Statistical Analysis, and Graphics presents an easy way to learn how to perform an analytical task in R, without having to...

The Medicine Bag: Shamanic Rituals & Ceremonies for Personal Transformation
The Medicine Bag: Shamanic Rituals & Ceremonies for Personal Transformation
One of the main tenets of shamanism is a belief in the power of ceremony to manifest change in the physical world. Virtually all shamanic traditions use a variety of ritual practices as tools for personal transformation, healing, and celebration.

Now, in this exciting and practical book, Toltec shaman and New York
...
Bangladesh in Bondage: Tarique Rahman, SQC, LB, and Other Essays
Bangladesh in Bondage: Tarique Rahman, SQC, LB, and Other Essays

This book brings together a collection of essays about the untenable political status quo in Bangladesh under Sheikh Hasina. Since democratization in the 1990s, Bangladeshi political life has been characterized by fierce battles over the role of religion in society, corruption, and the obstacles to constructing a society with freedom...

Embedded Software Development with C
Embedded Software Development with C

Embedded Software Development With C

Kai Qian

About this textbook:

  • Intelligible presentation of the fundamentals of embedded systems design and development using the C programming language and the 8051 microcontroller.
  • Examines the longevity and...
Spring in Action
Spring in Action
Spring in Action 2E is an expanded, completely updated second edition of the best selling Spring in Action. Written by Craig Walls, one of Manning's best writers, this book covers the exciting new features of Spring 2.0, which was released in October 2006.

Spring is a lightweight container framework that represents an...

unlimited object storage image
Result Page: 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy