Home | Amazing | Today | Tags | Publishers | Years | Search 
Selected Works of A.N. Kolmogorov: Volume III: Information Theory and the Theory of Algorithms
Selected Works of A.N. Kolmogorov: Volume III: Information Theory and the Theory of Algorithms

This volume is the last of three volumes devoted to the work of one of the most prominent 20th century mathematicians. Throughout his mathematical work, A.N. Kolmogorov (1903-1987) showed great creativity and versatility and his wide-ranging studies in many different areas, led to the solution of conceptual and fundamental problems and the...

Discrete Mathematics for Computer Scientists
Discrete Mathematics for Computer Scientists

Many colleges and universities offer a course in discrete mathematics. Students taking these courses are from many disciplines, one of the largest being computer science. As a part of the Mathematics Across the Curriculum project at Dartmouth, supported by the National Science Foundation,1 we proposed to create a discrete mathematics...

Knowledge Discovery from Data Streams (Chapman & Hall/CRC Data Mining and Knowledge Discovery Series)
Knowledge Discovery from Data Streams (Chapman & Hall/CRC Data Mining and Knowledge Discovery Series)

In the last three decades, machine learning research and practice have focused on batch learning usually using small datasets. In batch learning, the whole training data is available to the algorithm, which outputs a decision model after processing the data eventually (or most of the times) multiple times. The rationale behind this...

Introduction to Cryptography
Introduction to Cryptography

Cryptography is a key technology in electronic security systems. Modern cryptograpic techniques have many uses, such as to digitally sign documents, for access control, to implement electronic money, and for copyright protection. Because of these important uses it is necessary that users be able to estimate the efficiency and security...

The Bayesian Choice: From Decision-Theoretic Foundations to Computational Implementation (Springer Texts in Statistics)
The Bayesian Choice: From Decision-Theoretic Foundations to Computational Implementation (Springer Texts in Statistics)

The main purpose of statistical theory is to derive from observations of a random phenomenon an inference about the probability distribution underlying this phenomenon. That is, it provides either an analysis (description) of a past phenomenon, or some predictions about a future phenomenon of a similar nature. In this book, we insist...

Introduction to Cryptography (Undergraduate Texts in Mathematics)
Introduction to Cryptography (Undergraduate Texts in Mathematics)

Cryptography is a key technology in electronic security systems. Modern cryptograpic techniques have many uses, such as to digitally sign documents, for access control, to implement electronic money, and for copyright protection. Because of these important uses it is necessary that users be able to estimate the efficiency and security...

Managing and Using Information Systems: A Strategic Approach (Wiley Series in Probability and Statistics)
Managing and Using Information Systems: A Strategic Approach (Wiley Series in Probability and Statistics)

Managers do not have the luxury of abdicating participation in information systems decisions.Managers who choose to do so risk limiting their future business options. Information systems are at the heart of virtually every business interaction, process, and decision, especially when one considers the vast penetration of the Web in the...

Multidimensional Signal, Image, and Video Processing and Coding, Second Edition
Multidimensional Signal, Image, and Video Processing and Coding, Second Edition

This is a textbook for a first- or second-year graduate course for electrical and computer engineering (ECE) students in the area of digital image and video processing and coding. The course might be called Digital Image and Video Processing (DIVP) or some such, and has its heritage in the signal processing and communications areas of...

Machine Learning in Action
Machine Learning in Action

After college I went to work for Intel in California and mainland China. Originally my plan was to go back to grad school after two years, but time flies when you are having fun, and two years turned into six. I realized I had to go back at that point, and I didn’t want to do night school or online learning, I wanted to sit on...

Codes: An Introduction to Information Communication and Cryptography (Springer Undergraduate Mathematics Series)
Codes: An Introduction to Information Communication and Cryptography (Springer Undergraduate Mathematics Series)
Many people do not realise that mathematics provides the foundation for the devices we use to handle information in the modern world. Most of those who do know probably think that the parts of mathematics involved are quite ‘classical’, such as Fourier analysis and differential equations. In fact, a great deal of...
Theory of Optimal Search
Theory of Optimal Search
This book deals with the problem of optimal allocation of effort to detect a  target. A Bayesian approach is taken in which it is assumed that there is a  prior distribution for the target's location which is known to the searcher as  well as a function which relates the conditional probability of detecting...
Mobile and Wireless Communications for IMT-Advanced and Beyond
Mobile and Wireless Communications for IMT-Advanced and Beyond
This book was prompted by the desire to fill the gap between theoretical descriptions and a more pedagogical description of the main technological components of International Mobile Telecommunications Advanced (IMT-Advanced) such as Radio Resource Management (RRM), Carrier

Aggregation (CA), improved MIMO support, and
...
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy