Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Reverse Engineering: An Industrial Perspective (Springer Series in Advanced Manufacturing)
Reverse Engineering: An Industrial Perspective (Springer Series in Advanced Manufacturing)
Reverse engineering is the process of discovering the technological principles of an object or component through analysis of its structure and function. Such analysis can then be used to redesign the object very quickly using computer-aided design in concert with rapid-manufacturing processes to produce small numbers of components adapted to the...
Quantum Approach to Informatics
Quantum Approach to Informatics
An essential overview of quantum information

Information, whether inscribed as a mark on a stone tablet or encoded as a magnetic domain on a hard drive, must be stored in a physical object and thus made subject to the laws of physics. Traditionally, information processing such as computation occurred in a framework governed by laws of classical...

The Mathematical Foundation of Informatics
The Mathematical Foundation of Informatics
The first international conference organized in Vietnam, which concerns theoretical computer science, was the ICOMIDC Symposium on Mathematics of Computation, held in Ho Chi Minh City in 1988. For the last years great developments have been made in this areas. Therefore, it had become necessary to organize in Vietnam another international...
Algebraic Theory of Automata Networks (SIAM Monographs on Discrete Mathematics and Applications, 11)
Algebraic Theory of Automata Networks (SIAM Monographs on Discrete Mathematics and Applications, 11)
This self-contained monograph covers the foundations of what is currently known about automata networks, giving the reader sufficient theoretical background to be at the forefront of research in many related areas. Alexandra Kireeva, Mathematical Reviews

Algebraic Theory of Automata Networks investigates automata networks as
...
Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The wide variety of methods used in terrorism informatics are...
Informatics: 10 Years Back. 10 Years Ahead (Lecture Notes in Computer Science)
Informatics: 10 Years Back. 10 Years Ahead (Lecture Notes in Computer Science)
From August 27 to 31, 2000, the International Conference and Research Center for Computer Science in Schloss Dagstuhl, Dagstuhl for short, celebrated its 10th anniversary. Since its founding in 1990, the objective of the Center has been to promote world-class research in computer science, support leading-edge continuing education, and promote the...
Approximation Methods for Efficient Learning of Bayesian Networks: Volume 168 Frontiers in Artificial Intelligence and Applications
Approximation Methods for Efficient Learning of Bayesian Networks: Volume 168 Frontiers in Artificial Intelligence and Applications

This publication offers and investigates efficient Monte Carlo simulation methods in order to realize a Bayesian approach to approximate learning of Bayesian networks from both complete and incomplete data. For large amounts of incomplete data when Monte Carlo methods are inefficient, approximations are implemented, such that learning remains...

Advances in Databases and Information Systems: 8th East European Conference, ADBIS 2004, Budapest
Advances in Databases and Information Systems: 8th East European Conference, ADBIS 2004, Budapest
This volume continues the series of proceedings of the annual ADBIS conferences in the field of advances in databases and information systems.

ADBIS, founded by the Moscow ACM SIGMOD Chapter, was extended into a regular East-European conference in 1996 to establish a forum for promoting interaction and
...
Semantic Web Services: Theory, Tools and Applications
Semantic Web Services: Theory, Tools and Applications
Semantic Web is here to stay! This is not really a marketing campaign logo, but it is a truth that every year is becoming more and more relevant to the daily life of business world, industry and society. I do not know how it happened, but the last years, through our activities in the Special Interest Group on Semantic Web and Information Systems in...
Algorithmic Adventures: From Knowledge to Magic
Algorithmic Adventures: From Knowledge to Magic
The public image of computer science does not reflect its true nature. The general public and especially high school students identify computer science with a computer driving license. They think that studying computer science is not a challenge, and that anybody can learn it. Computer science is not considered a scientific discipline but a...
Algorithms on Strings, Trees and Sequences: Computer Science and Computational Biology
Algorithms on Strings, Trees and Sequences: Computer Science and Computational Biology
"...an important summary of the state of the art in pattern matching and an indicator of the importance biological problems have assumed among many researchers. It will hopefully encourage them to question the importance of the problems they endeavor to solve." SIGACT News

"The book will be profitable both for graduate
...
Integrity and Internal Control in Information Systems VI
Integrity and Internal Control in Information Systems VI
The development and integration of integrity and internal control mechanisms into information system infrastructures is a challenge for researchers, IT personnel and auditors. Since its beginning in 1997, the IICIS international working conference has focused on the following questions:
  • what precisely do business managers need...
unlimited object storage image
Result Page: 19 18 17 16 15 14 13 12 11 10 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy