Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
An Introduction to the Analysis of Algorithms (2nd Edition)
An Introduction to the Analysis of Algorithms (2nd Edition)

Despite growing interest, basic information on methods and models for mathematically analyzing algorithms has rarely been directly accessible to practitioners, researchers, or students. An Introduction to the Analysis of Algorithms, Second Edition, organizes and presents that knowledge, fully...

Malicious Attack Propagation and Source Identification (Advances in Information Security)
Malicious Attack Propagation and Source Identification (Advances in Information Security)

This book covers and makes four major contributions:

1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks;

2) proposing a novel approach to identify rumor sources in time-varying networks;

3) developing a fast approach to identify...

Data Access for Highly-Scalable Solutions: Using SQL, NoSQL, and Polyglot Persistence (Microsoft patterns & practices)
Data Access for Highly-Scalable Solutions: Using SQL, NoSQL, and Polyglot Persistence (Microsoft patterns & practices)
All applications use data, and most applications also need to store this data somewhere. In the world of business solutions, this often meant creating a relational database. However, relational technology is not always the best solution to meet the increasingly complex data-processing requirements of modern business systems, especially when...
C & C++ Code Capsules: A Guide for Practitioners
C & C++ Code Capsules: A Guide for Practitioners

This book shares the hard-won wisdom of a highly-successful C++/C programmer - along with a large collection of ANSI-compliant programs that illustrate the true power of C++. This book includes a wide variety of ideas, tips and techniques for programmers of all skill levels. It presents little-known facts about pointers and...

The Art of Error Correcting Coding
The Art of Error Correcting Coding
Building on the success of the first edition, which offered a practical introductory approach to the techniques of error concealment, this book, now fully revised and updated, provides a comprehensive treatment of the subject and includes a wealth of additional features. The Art of Error Correcting Coding, Second Edition explores...
Programming PHP
Programming PHP

This updated edition teaches everything you need to know to create effective web applications with the latest features in PHP 5.x. You’ll start with the big picture and then dive into language syntax, programming techniques, and other details, using examples that illustrate both correct usage and common idioms.

If...

Explorations in Computing: An Introduction to Computer Science (Chapman & Hall/CRC Textbooks in Computing)
Explorations in Computing: An Introduction to Computer Science (Chapman & Hall/CRC Textbooks in Computing)

Based on the author’s introductory course at the University of Oregon, Explorations in Computing: An Introduction to Computer Science focuses on the fundamental idea of computation and offers insight into how computation is used to solve a variety of interesting and important real-world problems. Taking an...

High-Speed Networking: A Systematic Approach to High-Bandwidth Low-Latency Communication
High-Speed Networking: A Systematic Approach to High-Bandwidth Low-Latency Communication
"Building networks with high performance demanded by today's applications requires a complete understanding of the basic principles and latest techniques. This book is the definitive guide to both."-Lyman Chapin

High-speed networking is the essential enabler of modern sophisticated distributed computing applications. This
...
Cluster Analysis for Data Mining and System Identification
Cluster Analysis for Data Mining and System Identification

Data clustering is a common technique for statistical data analysis, which is used in many fields, including machine learning, data mining, pattern recognition, image analysis and bioinformatics. Clustering is the classification of similar objects into different groups, or more precisely, the partitioning of a data set into subsets...

Data Mining with R: Learning with Case Studies
Data Mining with R: Learning with Case Studies

The versatile capabilities and large set of add-on packages make R an excellent alternative to many existing and often expensive data mining tools. Exploring this area from the perspective of a practitioner, Data Mining with R: Learning with Case Studies uses practical examples to illustrate the power of R and data...

How to Build a Business Rules Engine: Extending Application Functionality through Metadata Engineering
How to Build a Business Rules Engine: Extending Application Functionality through Metadata Engineering
Business rules engines can make organizations more agile by allowing them to manage diverse sets of operating rules, such as many different contracts for goods and services with different clients. For example, business rules engines can contain interfaces that allow users to define business rules to add specific functionality to software...
Home Recording Studio  Build it Like the Pros
Home Recording Studio Build it Like the Pros
With the advances in digital technology, musicians can now produce their own music. But the gear is only part of the equation when it comes to recording and mixing. The next part is finding a soundproof room that you can produce it in. Unfortunately, any old room in your house will not suffice for a quality recording. Without a decent room, you'l...
Result Page: 89 88 87 86 85 84 83 82 81 80 79 78 77 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy