|
|
|
|
|
|
|
Adversarial Reasoning: Computational Approaches to Reading the Opponent's MindThe rising tide of threats, from financial cybercrime to asymmetric military conflicts, demands greater sophistication in tools and techniques of law enforcement, commercial and domestic security professionals, and terrorism prevention. Concentrating on computational solutions to determine or anticipate an adversary's intent, Adversarial Reasoning:... | | Outcome Prediction in Cancer
This book is organized into 4 sections, each looking at the question of outcome prediction in cancer from a different angle. The first section describes the clinical problem and some of the predicaments that clinicians face in dealing with cancer. Amongst issues discussed in this section are the TNM staging, accepted methods for survival... | | Cryptography for Internet & Database ApplicationsCryptography is the gold standard for security. It is used to protect the transmission and storage of data between two parties by encrypting it into an unreadable format. Cryptography has enabled the first wave of secure transmissions, which has helped fuel the growth of transactions like shopping, banking, and finance over the world's biggest... |
|
|
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |