Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Distributed Algorithms (The Morgan Kaufmann Series in Data Management Systems)
Distributed Algorithms (The Morgan Kaufmann Series in Data Management Systems)
In Distributed Algorithms, Nancy Lynch provides a blueprint for designing, implementing, and analyzing distributed algorithms. She directs her book at a wide audience, including students, programmers, system designers, and researchers.

Distributed Algorithms
contains the most significant algorithms and impossibility
...
Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure
Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure
Cyber security is big business today. Smart Grid is big business today. Therefore let’s put the two together and write a book? Well, surely there will be some individuals that may make that assumption as to the motivation behind the publication of this book. The real motivation behind the development of this book is because...
Twitter Data Analytics (SpringerBriefs in Computer Science)
Twitter Data Analytics (SpringerBriefs in Computer Science)

This brief provides methods for harnessing Twitter data to discover solutions to complex inquiries. The brief introduces the process of collecting data through Twitter’s APIs and offers strategies for curating large datasets. The text gives examples of Twitter data with real-world examples, the present challenges and complexities of...

Stochastic Modeling and Analysis of Telecoms Networks
Stochastic Modeling and Analysis of Telecoms Networks

This book addresses the stochastic modeling of telecommunication networks, introducing the main mathematical tools for that purpose, such as Markov processes, real and spatial point processes and stochastic recursions, and presenting a wide list of results on stability, performances and comparison of systems.
The authors propose a
...

Information theory and statistics
Information theory and statistics
Highly useful text studies logarithmic measures of information and their application to testing statistical hypotheses. Includes numerous worked examples and problems. References. Glossary. Appendix....
Clustering (IEEE Press Series on Computational Intelligence)
Clustering (IEEE Press Series on Computational Intelligence)
Clustering has become an increasingly important topic in recent years, caused by the glut of data from a wide variety of disciplines. However, due to the lack of good communication among these communities, similar theories or algorithms are redeveloped many times, causing unnecessary waste of time and resources. Furthermore, different terminologies...
Numerical Methods for Image Registration (Numerical Mathematics and Scientific Computation)
Numerical Methods for Image Registration (Numerical Mathematics and Scientific Computation)

Based on the author's lecture notes and research, this well-illustrated and comprehensive text is one of the first to provide an introduction to image registration with particular emphasis on numerical methods in medical imaging. Ideal for researchers in industry and academia, it is also a suitable study guide for graduate mathematicians,...

Mobile Commerce Applications
Mobile Commerce Applications
Today, various m-commerce applications are increasingly enhancing enterprises' abilities to offer mobile services that are easily accessed by a mobile device anytime and anywhere. With the unique advantages of emerging mobile communications and wireless technologies, m-commerce applications are generally used to fulfill some tasks that are not...
Pancreatitis and Its Complications (Clinical Gastroenterology)
Pancreatitis and Its Complications (Clinical Gastroenterology)

Diseases of the pancreas have been extremely difficult to study. Until relatively recently, the pancreas was viewed by surgeons as an organ to be avoided, given its deep retroperitoneal location and the sometimes severe consequences of manipulation. Similar difficulties have plagued careful study of the pancreas. In humans, only inf- quently...

MCSA/MCSE 70-299 Exam Cram 2 : Implementing and Administering Security in a Windows 2003 Network
MCSA/MCSE 70-299 Exam Cram 2 : Implementing and Administering Security in a Windows 2003 Network
The 70-299 exam measures your ability to implement, manage, maintain, and troubleshoot security in a Windows Server 2003 network infrastructure and also plan and configure a Windows Server 2003 PKI. The MCSE 70-299 Exam Cram 2 gives you the essential information you need to know to learn how to implement, manage,...
Communicating Data with Tableau
Communicating Data with Tableau

Go beyond spreadsheets and tables and design a data presentation that really makes an impact. This practical guide shows you how to use Tableau Software to convert raw data into compelling data visualizations that provide insight or allow viewers to explore the data for themselves.

Ideal for analysts, engineers,...

FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security
FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security

If you are responsible for meeting federal information security requirements such as FISMA, this book is all you need to know to get a system authorized. Now in the first full revision of FISMA since its inception in 2002, a new wave of stronger security measures are now available through the efforts of the Department of Defense,...

unlimited object storage image
Result Page: 41 40 39 38 37 36 35 34 33 32 31 30 29 28 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy