Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cells and Robots: Modeling and Control of Large-Size Agent Populations (Springer Tracts in Advanced Robotics)
Cells and Robots: Modeling and Control of Large-Size Agent Populations (Springer Tracts in Advanced Robotics)
From the reviews:

"This interesting monograph is devoted to the study of multi-agent, populations of biological cells and robot teams. … The main objective of the approach is to provide solutions to the problem of how dynamics of an individual agent propagates to the population dynamics. … This original monograph has a wide...

Advanced Statistical Steganalysis (Information Security and Cryptography)
Advanced Statistical Steganalysis (Information Security and Cryptography)

Steganography and steganalysis, the hiding and detection of a covert payload within an innocent cover object, started to receive attention from the computer science, engineering, and mathematics communities in the 1990s. At first the problems were not clearly defined, but proper statistical foundations were proposed and mathematical...

Rough Computing: Theories, Technologies and Applications
Rough Computing: Theories, Technologies and Applications
Rough set theory is a new soft computing tool which deals with vagueness and uncertainty. It has attracted the attention of researchers and practitioners worldwide, and has been successfully applied to many fields such as knowledge discovery, decision support, pattern recognition, and machine learning.

Rough Computing: Theories,...

Public Key Cryptography: Applications and Attacks (IEEE Press Series on Information and Communication Networks Security)
Public Key Cryptography: Applications and Attacks (IEEE Press Series on Information and Communication Networks Security)

This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many...

An Invitation to Computer Science, 5th Edition
An Invitation to Computer Science, 5th Edition

This text is intended for a one-semester introductory course in computer science. It presents a breadth-first overview of the discipline that assumes no prior background in computer science, programming, or mathematics. It is appropriate for use in a service course for students not majoring in computer science. It is also appropriate...

C++ How to Program (8th Edition)
C++ How to Program (8th Edition)

Welcome to the C++ computer programming language and C++ How to Program, Eighth Edition! This book presents leading-edge computing technologies, and is particularly appropriate for inroductory course sequences based on the curriculum recommendations of two key professional organizations—the ACM and the IEEE.

The new...

Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks (Wiley Series on Parallel and Distributed Computing)
Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks (Wiley Series on Parallel and Distributed Computing)
Learn the fundamental algorithms and protocols for wireless and mobile ad hoc networks

Advances in wireless networking and mobile communication technologies, coupled with the proliferation of portable computers, have led to development efforts for wireless and mobile ad hoc networks. This book focuses on several aspects of wireless ad hoc...

Medical Image Analysis
Medical Image Analysis

The expanded and revised edition will split Chapter 4 to include more details and examples in FMRI, DTI, and DWI for MR image modalities. The book will also expand ultrasound imaging to 3-D dynamic contrast ultrasound imaging in a separate chapter.

A new chapter on Optical Imaging Modalities elaborating microscopy, confocal...

Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers (Embedded Technology)
Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers (Embedded Technology)
Wireless networking is poised to have a massive impact on communications, and the 802.11 standard is to wireless networking what Ethernet is to wired networking. There are already over 50 million devices using the dominant IEEE 802.11 (essentially wireless Ethernet) standard, with astronomical growth predicted over the next 10 years. New...
Classical and Quantum Information Theory: An Introduction for the Telecom Scientist
Classical and Quantum Information Theory: An Introduction for the Telecom Scientist
Information theory lies at the heart of modern technology, underpinning all communications, networking, and data storage systems. This book sets out, for the first time, a complete overview of both classical and quantum information theory. Throughout, the reader is introduced to key results without becoming lost in mathematical details. Opening...
Pattern Recognition, Second Edition
Pattern Recognition, Second Edition
Pattern recognition is becoming increasingly important in the age of automation and information handling and retrieval.
This book provides the most comprehensive treatment available of pattern recognition, from an engineering perspective. Developed through more than ten years of teaching experience, Pattern Recognition is appropriate for both
...
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance

Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with...

Result Page: 42 41 40 39 38 37 36 35 34 33 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy