Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Extending and Modifying LAMMPS Writing Your Own Source Code: A pragmatic guide to extending LAMMPS as per custom simulation requirements
Extending and Modifying LAMMPS Writing Your Own Source Code: A pragmatic guide to extending LAMMPS as per custom simulation requirements

Understand the LAMMPS source code and modify it to meet your research needs, and run simulations for bespoke applications involving forces, thermostats, pair potentials and more with ease

Key Features

  • Understand the structure of the LAMMPS source code
  • Implement custom...
System Integration: From Transistor Design to Large Scale Integrated Circuits
System Integration: From Transistor Design to Large Scale Integrated Circuits
The development of large-scale integrated systems-on-a-chip has had a dramatic effect on circuit design methodology. Escalating requirements for low-power, high-chip density circuits and systems have resulted in increasingly complex Bipolar, CMOS and BICMOS technologies. In order to design cost-effective and reliable systems a thorough...
Computer Vision Systems: 8th International Conference, ICVS 2011, Sophia Antipolis, France, September 20-22, 2011, Proceedings
Computer Vision Systems: 8th International Conference, ICVS 2011, Sophia Antipolis, France, September 20-22, 2011, Proceedings
Computer Vision is the science and technology of machines that see. The dominant scientific conferences in computer vision, such as ICCV, CVPR and ECCV, concentrate on theories and models for obtaining information from images and image sequences. The intensely competitive nature of these conferences leaves little room to...
Laptop Music Power!: The Comprehensive Guide
Laptop Music Power!: The Comprehensive Guide

This book is meant to be both an introduction to using computers in live music performance, as well as an advanced practical guide to this growing area of modern music. More and more musicians and bands working in a wide variety of different musical styles are using computers and software as part of their live performance rigs...

Introduction to Reversible Computing (Chapman & Hall/CRC Computational Science)
Introduction to Reversible Computing (Chapman & Hall/CRC Computational Science)

Few books comprehensively cover the software and programming aspects of reversible computing. Filling this gap, Introduction to Reversible Computing offers an expanded view of the field that includes the traditional energy-motivated hardware viewpoint as well as the emerging application-motivated software approach.

...

Manual of Diagnostic Ultrasound in Infectious Tropical Diseases
Manual of Diagnostic Ultrasound in Infectious Tropical Diseases
This manual is intended to fill a gap in the range of books on ultrasound diagnosis, concentrating exclusively on the diagnosis of infectious and tropical diseases. The book starts with a short introduction to ultrasound diagnosis. The main part describes and discusses the organ-related changes that can be detected with ultrasound in infectious and...
Bridging Scales and Knowledge Systems: Concepts and Applications in Ecosystem Assessment
Bridging Scales and Knowledge Systems: Concepts and Applications in Ecosystem Assessment

The Millennium Ecosystem Assessment (MA) was carried out between 2001 and 2005 to assess the consequences of ecosystem change for human well-being and to establish the basis for actions needed to enhance the conservation and sustainable use of ecosystems and their contributions to human well-being. The MA was originally conceived as a...

Data Structures & Algorithm Analysis in C++
Data Structures & Algorithm Analysis in C++

Data Structures and Algorithm Analysis in C++ is an advanced algorithms book that bridges the gap between traditional CS2 and Algorithms Analysis courses.

As the speed and power of computers increases, so does the need for effective programming and algorithm analysis. By approaching these skills in tandem, Mark Allen...

Digital Privacy: PRIME - Privacy and Identity Management for Europe
Digital Privacy: PRIME - Privacy and Identity Management for Europe
Information technologies are becoming pervasive and powerful to the point that the privacy of citizens is now at risk. Indeed, more and more of our daily transactions are conducted electronically and require us to transmit personal information. Examples include using an electronic identity card to prove one’s age in a...
Intersection: How Enterprise Design Bridges the Gap between Business, Technology, and People
Intersection: How Enterprise Design Bridges the Gap between Business, Technology, and People

Many organizations struggle with the dynamics and the complexity of today's social ecosystems that connect everyone and everything, everywhere and all the time. Facing challenges at the intersection of business models, technical developments, and human needs, modern enterprises must overcome the siloed thinking and isolated efforts of the...

Expert SharePoint 2010 Practices
Expert SharePoint 2010 Practices

Expert SharePoint 2010 Practices is a valuable compendium of best practices, tips, and secrets straight from the most knowledgeable SharePoint gurus in the industry.

Learn from the experts as you dive into topics like multitenancy, solution deployment, business intelligence, and administration. Our team of carefully
...

Next Generation Wireless Applications
Next Generation Wireless Applications
"There is no other book I've come across that offers this breadth of knowledge and makes you that excited about the possibilities in this fast paced market. Next Generation Wireless Applications is written in a very accessible way and packed full of useful insights from the author reflecting his extensive experience...
unlimited object storage image
Result Page: 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy