Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Markov Chains: Models, Algorithms and Applications (International Series in Operations Research & Management Science)
Markov Chains: Models, Algorithms and Applications (International Series in Operations Research & Management Science)
Markov chains are a particularly powerful and widely used tool for analyzing a variety of stochastic (probabilistic) systems over time. This monograph will present a series of Markov models, starting from the basic models and then building up to higher-order models. Included in the higher-order discussions are multivariate models, higher-order...
Game Data Analysis – Tools and Methods
Game Data Analysis – Tools and Methods

Probably the best book available on the overlooked art of game data analysis, this tutorial will help you improve your products by utilizing the right tools and techniques. Written by a dedicated professional in the field.

Overview

  • Familiarize yourself with the main key performance indicators for game...
Post Quantum Cryptography
Post Quantum Cryptography
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature...
Intelligent Data Analysis
Intelligent Data Analysis
This monograph is a detailed introductory presentation of the key classes of intelligent data analysis methods. The ten coherently written chapters by leading experts provide complete coverage of the core issues.

The first half of the book is devoted to the discussion of classical statistical issues, ranging from the basic concepts of...

Advances in Cryptology -- CRYPTO 2011: 31st Annual Cryptology Conference, Santa Barbara
Advances in Cryptology -- CRYPTO 2011: 31st Annual Cryptology Conference, Santa Barbara

This book constitutes the refereed proceedings of the 31st Annual International Cryptology Conference, CRYPTO 2011, held in Santa Barbara, CA, USA in August 2011. The 42 revised full papers presented were carefully reviewed and selected from 230 submissions. The volume also contains the abstract of one invited talk. The papers are organized...

Random Processes by Example
Random Processes by Example

This volume first introduces the mathematical tools necessary for understanding and working with a broad class of applied stochastic models. The toolbox includes Gaussian processes, independently scattered measures such as Gaussian white noise and Poisson random measures, stochastic integrals, compound Poisson, infinitely divisible and stable...

MATLAB Optimization Techniques
MATLAB Optimization Techniques

MATLAB is a high-level language and environment for numerical computation, visualization, and programming. Using MATLAB, you can analyze data, develop algorithms, and create models and applications. The language, tools, and built-in math functions enable you to explore multiple approaches and reach a solution faster than with spreadsheets or...

MCTS 70-620 Exam Prep: Microsoft Windows Vista, Configuring
MCTS 70-620 Exam Prep: Microsoft Windows Vista, Configuring

MCTS 70-620 Exam Prep: Microsoft Windows Vista, Configuring is designed for network administrators, network engineers, and consultants who are pursuing the Microsoft Certified Technology Specialist (MCTS) or Microsoft Certified IT Professional (MCITP) certifications for Windows Vista. This book covers the "TS: Microsoft Windows...

Random Matrix Theory and Wireless Communications
Random Matrix Theory and Wireless Communications
Random matrix theory has found many applications in physics, statistics and engineering since its inception. Although early developments were motivated by practical experimental problems, random matrices are now used in fields as diverse as Riemann hypothesis, stochastic differential equations, condensed matter physics, statistical physics, chaotic...
Multivariate Public Key Cryptosystems (Advances in Information Security)
Multivariate Public Key Cryptosystems (Advances in Information Security)

Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes have increasingly been seen as a possible alternative to number theoretic-based cryptosystems such as RSA, as they are generally more efficient in terms of computational effort. As quantum computers are developed, MPKC...

Data Analysis and Classification: Proceedings of the 6th Conference
Data Analysis and Classification: Proceedings of the 6th Conference

This volume contains revised versions of selected papers presented at the biennial meeting of the Classification and Data Analysis Group (CLADAG) of the Italian Statistical Society, which was held in Macerata, September 12–14, 2007. Carlo Lauro chaired the Scientific Programme Committee and Francesco Palumbo chaired the Local...

Algorithms for Computer Algebra
Algorithms for Computer Algebra

Algorithms for Computer Algebra is the first comprehensive textbook to be published on the topic of computational symbolic mathematics. The book first develops the foundational material from modern algebra that is required for subsequent topics. It then presents a thorough development of modern computational algorithms for such...

unlimited object storage image
Result Page: 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy