Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities...
The Data Compression Book
The Data Compression Book
If you want to learn how programs like PKZIP and LHarc work, this book is for you. The compression techniques used in these programs are described in detail, accompanied by working code. After reading this book, even the novice C programmer will be able to write a complete compression/archiving program that can be ported to virtually any operating...
Assouad Dimension and Fractal Geometry (Cambridge Tracts in Mathematics, Series Number 222)
Assouad Dimension and Fractal Geometry (Cambridge Tracts in Mathematics, Series Number 222)
The Assouad dimension is a notion of dimension in fractal geometry that has been the subject of much interest in recent years. This book, written by a world expert on the topic, is the first thorough account of the Assouad dimension and its many variants and applications in fractal geometry and beyond. It places the theory of the Assouad...
Grammatical Picture Generation: A Tree-Based Approach
Grammatical Picture Generation: A Tree-Based Approach
This book introduces the reader to the notions, the techniques, and the theory of grammatical picture generation, a research field focusing on formal systems that describe sets of pictures by means of syntactic rules. The book presents important types of picture generators, using a tree-based approach to stress their common algorithmic basis, the...
Mastering Algorithms with Perl
Mastering Algorithms with Perl
Many programmers would love to use Perl for projects that involve heavy lifting, but miss the many traditional algorithms that textbooks teach for other languages. Computer scientists have identified many techniques that a wide range of programs need, such as:
  • Fuzzy pattern matching for text (identify misspellings!) ...
Data Preparation for Data Mining (The Morgan Kaufmann Series in Data Management Systems)
Data Preparation for Data Mining (The Morgan Kaufmann Series in Data Management Systems)
Data Preparation for Data Mining addresses an issue unfortunately ignored by most authorities on data mining: data preparation. Thanks largely to its perceived difficulty, data preparation has traditionally taken a backseat to the more alluring question of how best to extract meaningful knowledge. But without adequate preparation of your...
Self-Similar Processes in Telecommunications
Self-Similar Processes in Telecommunications

For the first time the problems of voice services self-similarity are discussed systematically and in detail with specific examples and illustrations.

‘Self-Similar Processes in Telecommunications’ considers the self-similar (fractal and multifractal) models of telecommunication traffic and efficiency...

Fractal Geometry: Mathematical Foundations and Applications
Fractal Geometry: Mathematical Foundations and Applications
An accessible introduction to fractals, useful as a text or reference. Part I is concerned with the general theory of fractals and their geometry, covering dimensions and their methods of calculation, plus the local form of fractals and their projections and intersections. Part II contains examples of fractals drawn from a wide variety of areas in...
Antenna and EM Modeling with Matlab
Antenna and EM Modeling with Matlab

An accessible and practical tool for effective antenna design

Due to the rapid development of wireless communications, the modeling of radiation and scattering is becoming more important in the design of antennas. Consequently, it is increasingly important for antenna designers and students of antenna design to have a comprehensive...

The Artful Universe Expanded
The Artful Universe Expanded
Our love of art, writes John Barrow, is the end product of millions of years of evolution. How we react to a beautiful painting or symphony draws upon instincts laid down long before humans existed. Now, in this enhanced edition of the highly popular The Artful Universe, Barrow further explores the close ties between our aesthetic appreciation and...
The Fractal Geometry of Nature
The Fractal Geometry of Nature
Imagine an equilateral triangle. Now, imagine smaller equilateral triangles perched in the center of each side of the original triangle--you have a Star of David. Now, place still smaller equilateral triangles in the center of each of the star's 12 sides. Repeat this process infinitely and you have a Koch snowflake, a mind-bending geometric...
The Fractal Structure of Data Reference: Applications to the Memory Hierarchy
The Fractal Structure of Data Reference: Applications to the Memory Hierarchy
For purposes of understanding its performance, a computer system is traditionally viewed as a processor coupled to one or more disk storage devices, and driven by externally generated requests (typically called transactions). Over the past several decades, very powerful techniques have become available to the performance analyst attempting to...
unlimited object storage image
Result Page: 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy