Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Anti-Spam Measures: Analysis and Design
Anti-Spam Measures: Analysis and Design
The primary goal of this work is the methodical analysis of the potential, limitations, advantages, and drawbacks of anti-spam measures. These determine to which extent the measures can contribute to the reduction of spam in the long run. The range of considered anti-spam measures includes legislative, organizational, behavioral and technological...
The Encyclopedia of Children's Health and Wellness (Facts on File Library of Health and Living)
The Encyclopedia of Children's Health and Wellness (Facts on File Library of Health and Living)
Despite the fact that the risk of childhood disease is lower now than it has been in the past, childhood health care needs remain complex. This is mainly because as society and technology change rapidly, children are routinely exposed to new potential threats. For instance, in the last few years the National Institutes of Health and the Surgeon...
Analysis of Correlated Data with SAS and R
Analysis of Correlated Data with SAS and R
Previously known as Statistical Methods for Health Sciences, this bestselling resource is one of the first books to discuss the methodologies used for the analysis of clustered and correlated data. While the fundamental objectives of its predecessors remain the same, Analysis of Correlated Data with SAS and R, Third Edition incorporates...
Approximation and Online Algorithms: 8th International Workshop, WAOA 2010
Approximation and Online Algorithms: 8th International Workshop, WAOA 2010

Networked systems for transport, communication, and social interaction have contributed to all aspects of life by increasing economic and social efficiency. However, increased connectivity also gives intruders and attackers better opportunities to maliciously spread in the network, whether the spread is of disinformation, or of contamination...

Soft Computing for Recognition based on Biometrics (Studies in Computational Intelligence)
Soft Computing for Recognition based on Biometrics (Studies in Computational Intelligence)
We describe in this book, bio-inspired models and applications of hybrid intelligent systems using soft computing techniques for image analysis and pattern recognition based on biometrics and other information sources. Soft Computing (SC) consists of several intelligent computing paradigms, including fuzzy logic, neural networks,...
A New Leaf: The End of Cannabis Prohibition
A New Leaf: The End of Cannabis Prohibition
In November 2012, voters in Colorado and Washington passed landmark measures to legalize the production and sale of cannabis for social use--a first not only in the United States but also the world. Medical cannabis is now legal in twenty states and Washington, D.C., and more than one million Americans have turned to it in place of...
Random Processes by Example
Random Processes by Example

This volume first introduces the mathematical tools necessary for understanding and working with a broad class of applied stochastic models. The toolbox includes Gaussian processes, independently scattered measures such as Gaussian white noise and Poisson random measures, stochastic integrals, compound Poisson, infinitely divisible and stable...

Quality Measures in Data Mining (Studies in Computational Intelligence)
Quality Measures in Data Mining (Studies in Computational Intelligence)

Data mining analyzes large amounts of data to discover knowledge relevant to decision making. Typically, numerous pieces of knowledge are extracted by a data mining system and presented to a human user, who may be a decision-maker or a data-analyst. The user is confronted with the task of selecting the pieces of knowledge that are of the highest...

MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network: Study Guide and DVD Training System (Exam 70-214)
MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network: Study Guide and DVD Training System (Exam 70-214)

The MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network Study Guide (Exam 70-214) is a one-of-a-kind integration text and Web-based exam simulation and remediation. This system gives you 100% coverage of the official Microsoft Exam 70-214 objectives.

  • Completely Guaranteed Coverage of All...
Performance Analysis of Communications Networks and Systems
Performance Analysis of Communications Networks and Systems
Performance analysis belongs to the domain of applied mathematics. The
major domain of application in this book concerns telecommunications systems
and networks. We will mainly use stochastic analysis and probability
theory to address problems in the performance evaluation of telecommunications
systems and networks. The first
...
Sas R 9.1.3 OLAP Server: MDX Guide
Sas R 9.1.3 OLAP Server: MDX Guide
Multidimensional Expressions (MDX) is a powerful syntax that enables you to query multidimensional objects and provide commands that retrieve and manipulate multidimensional data from those objects. MDX is designed to ease the process of accessing data from multiple dimensions. It addresses the conceptual differences between two-dimensional and...
Securing & Optimizing Linux: The Hacking Solution
Securing & Optimizing Linux: The Hacking Solution
This 3rd edition of the very popular title "Securing & Optimizing Linux" looks for security measures that go beyond firewalls and intrusion detection systems to anticipate and protect against upcoming threats. Securing & Optimizing Linux: The Hacking Solution: A hacker's guide to protect your Linux server designed for system...
unlimited object storage image
Result Page: 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy