Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Polar Bear Expedition: The Heroes of America's Forgotten Invasion of Russia, 1918-1919
The Polar Bear Expedition: The Heroes of America's Forgotten Invasion of Russia, 1918-1919

In the brutally cold winter of 1919, 5,000 Americans battled the Red Army 600 miles north of Moscow. We have forgotten. Russia has not.

"AN EXCELLENT BOOK." —Wall Street Journal • "INCREDIBLE." — John U. Bacon •...

Eric Hobsbawm: A Life in History
Eric Hobsbawm: A Life in History
Eric Hobsbawm's works have had a nearly incalculable effect across generations of readers and students, influencing more than the practice of history but also the perception of it. Born in Alexandria, Egypt, of second-generation British parents, Hobsbawm was orphaned at age fourteen in 1931. Living with an uncle in Berlin, he...
Introduction to Microsystem Design (RWTHedition)
Introduction to Microsystem Design (RWTHedition)
This book was developed from lectures held at RWTH Aachen University, Germany and Tsinghua University at Beijing, P.R. China. It may be used as a basis for similar lectures on designing of microsystems. For this purpose, it is recommended to follow the sequence of this book, because it is arranged such that following chapters are...
Fourier Analysis on Finite Groups with Applications in Signal Processing and System Design
Fourier Analysis on Finite Groups with Applications in Signal Processing and System Design
Discover applications of Fourier analysis on finite non-Abelian groups

The majority of publications in spectral techniques consider Fourier transform on Abelian groups. However, non-Abelian groups provide notable advantages in efficient implementations of spectral methods.

Fourier Analysis on Finite Groups with Applications in...

Post Quantum Cryptography
Post Quantum Cryptography
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature...
Migrants Before the Law: Contested Migration Control in Europe
Migrants Before the Law: Contested Migration Control in Europe
This book traces the practices of migration control and its contestation in the European migration regime in times of intense politicization. The collaboratively written work brings together the perspectives of state agents, NGOs, migrants with precarious legal status, and their support networks, collected through multi-sited fieldwork...
The SIAM 100-Digit Challenge: A Study in High-Accuracy Numerical Computing
The SIAM 100-Digit Challenge: A Study in High-Accuracy Numerical Computing
"Destined to be a classic of modern computational science... a gourmet feast in ten courses." from the foreword by David H. Bailey, Lawrence Berkeley National Laboratory."

The authors, members of teams that solved all 10 problems, show in detail multiple approaches for solving each problem,
...
RFID Applied
RFID Applied
Everything you need to know to implement and fully leverage RFID technology

RFID Applied is just that—the application of radio-frequency identification (RFID) technology. The book discusses both the technical and the business issues involved in selecting, developing, and implementing an RFID system.

...
Wine For Dummies (Cooking)
Wine For Dummies (Cooking)

Wine enthusiasts and novices, raise your glasses! The #1 wine book has been extensively updated! If you’re a connoisseur, Wine For Dummies, Fourth Edition will get you up to speed on what’s in and show you how to take your hobby to the next level. If you’re new to the world of wine, it will clue you in on what...

Robustness and Complex Data Structures
Robustness and Complex Data Structures
Our journey towards this Festschrift started when realizing that our teacher, mentor, and friend Ursula Gather was going to celebrate her 60th birthday soon. As a researcher, lecturer, scientific advisor, board member, reviewer, editor, Ursula has had a wide impact...
Elements of Quantum Information
Elements of Quantum Information
'Elements of Quantum Information' introduces the reader to the fascinating field of quantum information processing, which lives on the interface between computer science, physics, mathematics, and engineering. This interdisciplinary branch of science thrives on the use of quantum mechanics as a resource for high potential modern applications. With...
Knowledge-Based Neurocomputing
Knowledge-Based Neurocomputing
Neurocomputing methods are loosely based on a model of the brain as a network of simple interconnected processing elements corresponding to neurons. These methods derive their power from the collective processing of artificial neurons, the chief advantage being that such systems can learn and adapt to a changing environment. In knowledge-based...
Result Page: 35 34 33 32 31 30 29 28 27 26 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy