 |
|
|
 Grading Knowledge: Extracting Degree Information from Texts
If you are sitting in a basement room without a view — not to mention the
bars in front of the windows — and writing a book, then you better have
good company. I had the best company you could imagine. Waltraud Hiltl,
Katja Markert, Martin Romacker, Klemens Schnattinger, Andreas Klee and I
shared very little office... |  |  Handbook of Data Intensive Computing
This handbook is carefully edited book – contributors are worldwide experts in
the field of data intensive computing and their applications. The scope of the
book includes leading edge data intensive computing architectures and systems,
innovative storage, virtualization, and parallel processing technologies applied in... |  |  Introduction to Hardware Security and Trust
As technology feature size of devices and interconnects shrink at the rate predicted
by Moore’s law, gate density and design complexity on single integrated chip
(IC) keep increasing in recent decades. The close to nanoscale fabrication process
introduces more manufacturing errors. New failure mechanisms that are not covered... |
|
|
 Bayesian Networks: A Practical Guide to Applications (Statistics in Practice)
Bayesian Networks, the result of the convergence of artificial intelligence with statistics, are growing in popularity. Their versatility and modelling power is now employed across a variety of fields for the purposes of analysis, simulation, prediction and diagnosis.
This book provides a general introduction to Bayesian networks,... |  |  Interactive Theorem Proving and Program Development
A practical introduction to the development of proofs and certified programs using Coq.
An invaluable tool for researchers, students, and engineers interested in formal methods and the development of zero-fault software. ... |  |  Models and Analysis for Distributed Systems (ISTE)
Verification and hence modeling are a mandatory but intricate problem for engineers
developing embedded distributed real-time systems that are entrusted with critical
safety applications like medical care, transportation, energy production, industrial
processes, military operations. Therefore, while emerging 40 years ago, first for... |
|
| Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |