Home | Amazing | Today | Tags | Publishers | Years | Search 
Scientific Data Mining and Knowledge Discovery: Principles and Foundations
Scientific Data Mining and Knowledge Discovery: Principles and Foundations

This book suits both graduate students and researchers with a focus on discovering knowledge from scientific data. The use of computational power for data analysis and knowledge discovery in scientific disciplines has found its roots with the revolution of high-performance computing systems. Computational science in physics,...

Foundations of XML Processing: The Tree-Automata Approach
Foundations of XML Processing: The Tree-Automata Approach

Computer science, like other mathematical fields, cannot live without a tight relationship with reality. However, such a relationship is, frankly, not very common. This is probably why people so enthusiastically welcome a true meeting of theory and practice. In that sense, the coming together of XML and tree automata theory was a...

Social Web Evolution: Integrating Semantic Applications and Web 2.0 Technologies
Social Web Evolution: Integrating Semantic Applications and Web 2.0 Technologies

As semantic technologies prove their value with targeted applications, there are increasing opportunities to consider their application in social contexts for knowledge, learning, and human development.

Semantic Web and Knowledge Management has been accepted as a critical enabler aiming to increase knowledge-related performance...

Fundamentals of Communications Systems (Communications Engineering)
Fundamentals of Communications Systems (Communications Engineering)

Get a Solid Account of Physical Layer Communications Theory, Illustrated with Numerous Interactive MATLAB Mini-Projects

You can rely on Fundamentals of Communications Systems for a solid introduction to physical layer communications theory, filled with modern implementations and MATLAB examples. This state-of-the-art...

ATM & MPLS Theory & Application: Foundations of Multi-Service Networking
ATM & MPLS Theory & Application: Foundations of Multi-Service Networking

Why did we decide to update this book on ATM once again? Mainly, because the publisher asked us to! Seriously, though, in the fast moving telecommunications industry, a lot has happened since the publication of the last edition in 1998. In case you have been asleep, Internet-based communication is clearly the killer application for...

Sams Teach Yourself Visual C# 2010 in 24 Hours: Complete Starter Kit
Sams Teach Yourself Visual C# 2010 in 24 Hours: Complete Starter Kit

Over a decade ago, a small team of designers met in a small conference room on the second floor of Building 41 at Microsoft to create a brand-new language, C#. The guiding principles of the language emphasized simplicity, familiarity, safety, and practicality. Of course, all those principles needed to balance against one another; none are...

Information Security and Cryptology: 5th International Conference, Inscrypt 2009
Information Security and Cryptology: 5th International Conference, Inscrypt 2009

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2009, held in Beijing, China, in December 2009. The 22 revised full papers and 10 short papers presented were carefully reviewed and selected from 147 submissions. The papers are...

Pro VB 2010 and the .NET 4.0 Platform
Pro VB 2010 and the .NET 4.0 Platform

Be the first to understand .NET 4.0 and Visual Basic 2010. Pro VB 2010 and the .NET 4.0 Platform provides developers with a complete guide to the new technology, explaining the importance of all the key VB 2010 language features. This new edition has been comprehensively revised and rewritten to make it accurately reflect the VB 10...

Towards Hardware-Intrinsic Security: Foundations and Practice (Information Security and Cryptography)
Towards Hardware-Intrinsic Security: Foundations and Practice (Information Security and Cryptography)

Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required anymore, and the key is only present in the device for a minimal amount of time....

Introduction To Digital Signal Processing: Computer Musically Speaking
Introduction To Digital Signal Processing: Computer Musically Speaking

This book offers an introduction to digital signal processing (DSP) with an emphasis on audio signals and computer music. It covers the mathematical foundations of DSP, important DSP theories including sampling, LTI systems, the z-transform, FIR/IIR filters, classic sound synthesis algorithms, various digital effects, topics in time and...

Learning Classifier Systems: From Foundations to Applications
Learning Classifier Systems: From Foundations to Applications

Learning classi er systems are a machine learning paradigm introduced by John Holland in 1976. They are rule-based systems in which learning is viewed as a process of ongoing adaptation to a partially unknown environment through genetic algorithms and temporal di erence learning.

From the beginning, classi er systems have attracted...

Parameterized and Exact Computation: 5th International Symposium
Parameterized and Exact Computation: 5th International Symposium

The International Symposium on Parameterized and Exact Computation (IPEC, formerly IWPEC) is an international symposium series that covers research in all aspects of parameterized and exact algorithms and complexity. Started in 2004 as a biennial workshop, it became an annual event from 2008.

The four previous meetings of the...

Result Page: 76 75 74 73 72 71 70 69 68 67 66 65 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy