Home | Amazing | Today | Tags | Publishers | Years | Search 
Simulated Annealing and Boltzmann Machines: A Stochastic Approach to Combinatorial Optimization and Neural Computing
Simulated Annealing and Boltzmann Machines: A Stochastic Approach to Combinatorial Optimization and Neural Computing

Wiley-Interscience Series in Discrete Mathematics and Optimization Advisory Editors Ronald L. Graham Jan Karel Lenstra Robert E. Tarjan Discrete Mathematics and Optimization involves the study of finite structures. It is one of the fastest growing areas in mathematics today. The level and depth of recent advances in the area and the wide...

Security in Ad-hoc and Sensor Networks (Computer and Network Security)
Security in Ad-hoc and Sensor Networks (Computer and Network Security)

Ad hoc and sensor networks continue to have a growing impact on communication. These cost-effective wireless networks provide location independent computing in environments ranging from military battlefields to in-home patient monitoring systems. However, having real-time connectivity to critical information over an open...

Microsoft BizTalk 2010: Line of Business Systems Integration
Microsoft BizTalk 2010: Line of Business Systems Integration

We know that it is rare in IT departments today that solutions do not have to integrate with other systems and even external entities. Systems just have to be connected to support the complex business processes and levels of automation that the business is demanding. Some of these systems are really at the core of the business. They can...

Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011

On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011). Each year DIMVA brings together international experts from academia, industry and government to present and discuss novel security research....

Oracle PeopleSoft Enterprise Financial Management 9.1 Implementation
Oracle PeopleSoft Enterprise Financial Management 9.1 Implementation

PeopleSoft financial applications have been recognized as a leading ERP product across a wide range of industries that help organizations automate their accounting operations, cut costs, and streamline business processes. They offer industry leading solutions for organizations' global needs, however complex they may be.

...

Numerical Analysis Using MATLAB and Spreadsheets: Second Edition
Numerical Analysis Using MATLAB and Spreadsheets: Second Edition

Numerical analysis is the branch of mathematics that is used to find approximations to difficult problems such as finding the roots of non-linear equations, integration involving complex expressions and solving differential equations for which analytical solutions do not exist. It is applied to a wide variety of disciplines such as...

Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2011, Beijing, China, July 9, 2011
Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2011, Beijing, China, July 9, 2011

concerned with the study of the development and use of advanced information technologies and systems for national, international, and societal security-related applications. In the past few years,we have witnessed that ISI experienced tremendous growth and attracted significant interest involving academic researchers in related fields...

Autonomic Network Management Principles: From Concepts to Applications
Autonomic Network Management Principles: From Concepts to Applications

The development of network technologies and networked services has been tremendous the last decade and is expected to be more intensive in the near future with the technological progress in the field of radio communications, data communication, protocols, software engineering, applications and so on. In this plethora of technologies,...

Using JRuby: Bringing Ruby to Java (Facets of Ruby)
Using JRuby: Bringing Ruby to Java (Facets of Ruby)

In Using JRuby you'll venture into the wide world of open-source Ruby and Java libraries. Write Ruby on Rails web applications that run on Java servers like Tomcat. Use Java's JDBC or Hibernate to easily connect Ruby to industry-standard databases. Test your Java program using Ruby's elegant Cucumber and RSpec...

Game Engine Architecture
Game Engine Architecture

A 2009 Game Developer Magazine Front Line Award Finalist, this book covers both the theory and practice of game engine software development, bringing together complete coverage of a wide range of topics. The concepts and techniques described are the actual ones used by real game studios like Electronic Arts and Naughty Dog. The examples are...

Alfresco 3 Records Management
Alfresco 3 Records Management

This book is structured in a sequential way that walks you through the steps necessary to set up your Alfresco Records Management system. Chapters follow a logical progression with each chapter building on the knowledge and implementation details learned in earlier chapters. If you are a records manager, business analyst, or a software...

CompTIA Security+ SYO-201 Cert Guide
CompTIA Security+ SYO-201 Cert Guide

Welcome to the CompTIA Security+ SY0-201 Cert Guide. The CompTIA Security+ Certification is widely accepted as the first security certification you should attempt to attain in your information technology (IT) career. The CompTIA Security+ Certification is designed to be a vendor-neutral exam that measures your knowledge of...

Result Page: 328 327 326 325 324 323 322 321 320 319 318 317 316 315 314 313 312 311 310 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy