Home | Amazing | Today | Tags | Publishers | Years | Search 
The Burrows-Wheeler Transform: Data Compression, Suffix Arrays, and Pattern Matching
The Burrows-Wheeler Transform: Data Compression, Suffix Arrays, and Pattern Matching
The Burrows-Wheeler Transform is a text transformation scheme that has found applications in different aspects of the data explosion problem, from data compression to index structures and search. The BWT belongs to a new class of compression algorithms, distinguished by its ability to perform compression by sorted contexts. More recently, the BWT...
Code Leader: Using People, Tools, and Processes to Build Successful Software (Programmer to Programmer)
Code Leader: Using People, Tools, and Processes to Build Successful Software (Programmer to Programmer)
Code Leader: Using People, Tools, and Processes to Build Successful Software

"Patrick is a pragmatist with a purist's knowledge. He has a deep understanding of what 'smells' right, and he knows when and how to find the right balance to get the job done. This philosophy of balanced 'pure pragmatism' pervades this book...

Perl Debugged
Perl Debugged
"This book was a joy to read. It covered all sorts of techniques for debugging, including 'defensive' paradigms that will eliminate bugs in the first place. As coach of the USA Programming Team, I find the most difficult thing to teach is debugging. This is the first text I've even heard of that attacks the problem. It does a fine job. Please...
DNA Computing Models (Advances in Information Security)
DNA Computing Models (Advances in Information Security)
Sir Francis Crick would undoubtedly be at the front of the line ordering this fascinating book. Being one of the discoverers of DNA, he would be amazed at how his work has been applied to mankind's most important invention, the computer. DNA contains the genetic instructions for the biological development of cellular life forms or viruses. DNA...
The Conspirators Hierarchy: The Committee of Three Hundred
The Conspirators Hierarchy: The Committee of Three Hundred
Can you imagine an all powerful group, that knows no national boundaries, above the laws of all countries, one that controls every aspect of politics, religion, commerce and industry; banking, insurance, mining, the drug trade, the petroleum industry, a group answerable to no one but its members. To the vast majority of us, such a group would...
Robust Range Image Registration Using Genetic Algorithms And The Surface Interpenetration Measure
Robust Range Image Registration Using Genetic Algorithms And The Surface Interpenetration Measure
This book addresses the range image registration problem for automatic 3D model construction. The focus is on obtaining highly precise alignments between different view pairs of the same object to avoid 3D model distortions; in contrast to most prior work, the view pairs may exhibit relatively little overlap and need not be prealigned. To this end,...
Cost Optimization of Structures: Fuzzy Logic, Genetic Algorithms, and Parallel Computing
Cost Optimization of Structures: Fuzzy Logic, Genetic Algorithms, and Parallel Computing
While the weight of a structure constitutes a significant part of the cost, a minimum weight design is not necessarily the minimum cost design. Little attention in structural optimization has been paid to the cost optimization problem, particularly of realistic three-dimensional structures. Cost optimization is becoming a priority in all civil...
Google Hacking for Penetration Testers, Volume 2
Google Hacking for Penetration Testers, Volume 2
A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those queries and trading screenshots of their findings. I know because Ive seen it with my own eyes. As the founder of the Google...
ALGORITHMIC RESULTS IN LIST DECODING (Foundations and Trends(R) in Theoretical Computer Science)
ALGORITHMIC RESULTS IN LIST DECODING (Foundations and Trends(R) in Theoretical Computer Science)
Algorithmic Results in List Decoding introduces and motivates the problem of list decoding, and discusses the central algorithmic results of the subject, culminating with the recent results on achieving "list decoding capacity." The main technical focus is on giving a complete presentation of the recent algebraic results achieving list...
Building powerful and robust websites with Drupal 6
Building powerful and robust websites with Drupal 6
This book updates the bestselling Drupal: Creating Blogs, Forums, Portals, and Community Websites for Drupal 6, the latest, much improved version of this popular open-source Content Management System. Targeting readers with little experience in website design, unfamiliar with PHP, MySQL or HTML, and with little to no experience of Drupal, it looks...
Java(tm) for S/390® and AS/400® COBOL Programmers
Java(tm) for S/390® and AS/400® COBOL Programmers
Written by mainframe and midrange professionals George Farr and Phil Coulthard, Java for S/390 & AS/400 COBOL Programmers is designed to help COBOL programmers make the jump to Java. It teaches COBOL programmers how to read and write Java programs and helps them understand the concepts necessary to continue to improve their Java skills. Rather...
Bioinformatics: A Practical Guide to the Analysis of Genes and Proteins, Second Edition
Bioinformatics: A Practical Guide to the Analysis of Genes and Proteins, Second Edition
"In this book, Andy Baxevanis and Francis Ouellette . . . have undertaken the difficult task of organizing the knowledge in this field in a logical progression and presenting it in a digestible form. And they have done an excellent job. This fine text will make a major impact on biological research and, in turn, on progress in biomedicine. We...
Result Page: 376 375 374 373 372 371 370 369 368 367 366 365 364 363 362 361 360 359 358 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy