Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Swarm Intelligence in Data Mining (Studies in Computational Intelligence)
Swarm Intelligence in Data Mining (Studies in Computational Intelligence)
Science is a swarm.

To the layperson, the stereotypical scientist is logical, clear-thinking, wellinformed but perhaps socially awkward, carefully planning his or her experiments and then analyzing the resulting data deliberately, with precision. The scientist works alone, emotion-free, searching only for truth, having been well advised
...
Post Quantum Cryptography
Post Quantum Cryptography
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature...
Bioinformatics Technologies
Bioinformatics Technologies
Solving modern biological problems requires advanced computational methods. Bioinformatics evolved from the active interaction of two fast-developing disciplines, biology and information technology. The central issue of this emerging field is the transformation of often distributed and unstructured biological data into meaningful information....
First Course on Fuzzy Theory and Applications (Advances in Soft Computing)
First Course on Fuzzy Theory and Applications (Advances in Soft Computing)

This basic textbook gives an easily accessible introduction to fuzzy theory and its applications. It provides basic and concrete concepts of the field in a self-contained, condensed and understandable style. This First Course on Fuzzy Theory and Applications includes numerous examples, descriptive illustrations and figures of the basic concepts,...

An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)
An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)
This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the construction and security analysis of diverse cryptosystems. Only basic linear algebra is required...
Beginning Microsoft Word Business Documents
Beginning Microsoft Word Business Documents

Beginning Microsoft Word Business Documents is filled with practical applications of Word's many features. It walks you through the creation of professional documents such as business plans, legal documents, newsletters, and grants. You'll also learn how to use surveys and forms to gather information.

Each chapter of the book...

Solar Power for Your Home (Green Guru Guides)
Solar Power for Your Home (Green Guru Guides)

Easy, inexpensive, do-it-yourself solar energy projects

Featuring step-by-step instructions and useful photos and illustrations, this hands-on guide is filled with solar energy solutions you can put to use right away. Solar Power for Your Home shows you how to set up a variety of simple, money-saving solar projects quickly...

Learning Together Online: Research on Asynchronous Learning Networks
Learning Together Online: Research on Asynchronous Learning Networks
This book is about the past and future of research on the effectiveness of learning networks, a type of e-learning, online learning, Web-based learning, computer-supported collaborative learning, or virtual classroom (to use a number of common terms) in which students and teachers learn together online. The formal term is ...
Mobile WiMAX (Wiley - IEE)
Mobile WiMAX (Wiley - IEE)

With the wide and rapid deployment of wireless LANs technology, WiMAX is an emerging technology in wireless communication and is one of the hottest subjects in wireless communications.

Mobile WiMAX is based on selected papers and plenary speeches from the 2007 IEEE Mobile WiMAX Symposium, this book provides...

OAuth 2.0 Identity and Access Management Patterns
OAuth 2.0 Identity and Access Management Patterns

Want to learn the world’s most widely used authorization framework? This tutorial will have you implementing secure Oauth 2.0 grant flows without delay. Written for practical application and clear instruction, it’s the complete guide.

Overview

  • Build web, client-side, desktop, and server-side...
Uncertainty and Information: Foundations of Generalized Information Theory
Uncertainty and Information: Foundations of Generalized Information Theory
Deal with information and uncertainty properly and efficiently using tools emerging from generalized information theory

Uncertainty and Information: Foundations of Generalized Information Theory contains comprehensive and up-to-date coverage of results that have emerged from a research program begun by the author in the early 1990s under the...

JavaScript(TM) Phrasebook
JavaScript(TM) Phrasebook
Developers are hungry for a concise, easy-to-use reference that puts essential code "phrases" at their fingertips. JavaScript, and the related AJAX, is hot and there is little to no information on how to use JavaScript to develop AJAX-based applications. While there are many JavaScript books on the market, most of them are dated and few...
unlimited object storage image
Result Page: 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy