Home | Amazing | Today | Tags | Publishers | Years | Search 
An Introduction to Modern Mathematical Computing: With Maple(TM)
An Introduction to Modern Mathematical Computing: With Maple(TM)

Thirty years ago mathematical, as opposed to applied numerical, computation was difficult to perform and so relatively little used. Three threads changed that: the emergence of the personal computer; the discovery of fiber-optics and the consequent development of the modern internet; and the building of the Three “M’s”...

Filtering, Segmentation and Depth (Lecture Notes in Computer Science)
Filtering, Segmentation and Depth (Lecture Notes in Computer Science)

Computer vision seeks a process that starts with a noisy, ambiguous signal from a TV camera and ends with a high-level description of discrete objects located in 3-dimensional space and identified in a human classification. In this book we address this process at several levels. We first treat the low-level image-processing issues of...

Chemical Engineering: Solutions to the Problems in Volume 1 (Coulson and Richardsons Chemical Engineering)
Chemical Engineering: Solutions to the Problems in Volume 1 (Coulson and Richardsons Chemical Engineering)

Each of the volumes of the Chemical Engineering Series includes numerical examples to illustrate the application of the theory presented in the text. In addition, at the end of each volume, there is a selection of problems which the reader is invited to solve in order to consolidate his (or her) understanding of the principles and to...

Visualization of Scientific Parallel Programs (Lecture Notes in Computer Science)
Visualization of Scientific Parallel Programs (Lecture Notes in Computer Science)

The substantial effort of parallel programming is only justified if the resulting codes are adequately efficient. In this sense, all types of performance tuning are extremely important to parallel software development. With parallel programs, performance improvements are much more difficult to achieve than with con ventional...

ALGORITHMS FOR LINEAR-QUADRATIC OPTIMIZATION
ALGORITHMS FOR LINEAR-QUADRATIC OPTIMIZATION

Linear-quadratic optimization is one of the most exciting topics in the con trol engineering literature of recent decades. The interest in linear optimal dynamical systems, and especially in those with quadratic cost functional, can be explained by both the richness of properties these systems possess, and the pragmatic value and physical...

Computer Methods for Analysis of Mixed-Mode Switching Circuits
Computer Methods for Analysis of Mixed-Mode Switching Circuits

Mixed-mode switching circuits distinguish themselves from other circuits by including switches that are either clocked externally or controlled internally. These circuits have found broad applications in telecommunication networks, instrumentation, and power electronic systems, to name a few. It is the emergence of switched capacitor...

Dynamic Fracture Mechanics
Dynamic Fracture Mechanics

This book consists of 9 chapters encompassing both the fundamental aspects of dynamic fracture mechanics as well as the studies of fracture mechanics in novel engineering materials. The chapters have been written by leading authorities in various fields of fracture mechanics from all over the world. These chapters have been arranged...

Damage and Interfacial Debonding in Composites (Studies in Applied Mechanics)
Damage and Interfacial Debonding in Composites (Studies in Applied Mechanics)

This book represents thirteen papers that are based on the presentations made in the five session symposium on "Damage and Interfacial Debonding in Composites" on the occasion of the 32nd Society of Engineering Science Meeting; held in New Orleans, Louisiana, October 29 - November 1, 1995. The five sessions were mainly in the...

Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

Principles of Communications Networks and Systems
Principles of Communications Networks and Systems

This book addresses the fundamentals of communications systems and networks, providing models and analytical methods for evaluating their performance. It is divided into ten chapters, which are the result of a joint effort by the authors and contributors. The authors and the contributors have a long history of collaboration, both in...

Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems: 7th International Conference
Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems: 7th International Conference

Cutting planes (cuts) are very popular in the OR community, where they are used to strengthen the Linear Programming (LP) relaxation of Mixed-Integer Programs (MIPs) in the hope of improving the performance of an exact LPbased solver. In particular, an intense research effort has been devoted to the study of families of general cuts,...

Recent Advances in Parallel Virtual Machine and Message Passing Interface
Recent Advances in Parallel Virtual Machine and Message Passing Interface
Thirteen years after the publication of the first MPI (message passing interface) specification and 17 years after the first published paper on PVM(parallel virtual machine), MPI and PVM have emerged as standard programming environments and continue to be the development environment of choice for a large variety of...
Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy