Home | Amazing | Today | Tags | Publishers | Years | Search 
The Mathematics of Coding Theory
The Mathematics of Coding Theory

This book is intended to be accessible to undergraduate students with two years of typical mathematics experience, most likely meaning calculus with a little linear algebra and differential equations. Thus, specifically, there is no assumption oLa background inabstr&;t algebra or number theory, nor of probability, nor of linear...

Principles and Practice of Constraint Programming - CP 2006: 12th International Conference
Principles and Practice of Constraint Programming - CP 2006: 12th International Conference

The 12th International Conference on the Principles and Practice of Constraint Programming (CP 2006) was held in Nantes, France, September 24–29, 2006. Information about the conference can be found on theWeb at http://www.sciences. univ-nantes.fr/cp06/. Information about past conferences in the series can be found at...

Deploying IP and MPLS QoS for Multiservice Networks: Theory & Practice
Deploying IP and MPLS QoS for Multiservice Networks: Theory & Practice

QoS, short for "quality of service," is one of the most important goals a network designer or administrator will have. Ensuring that the network runs at optimal precision with data remaining accurate, traveling fast, and to the correct user are the main objectives of QoS. The various media that fly across the network including...

Database Systems: Design, Implementation, and Management (with Bind-In Printed Access Card)
Database Systems: Design, Implementation, and Management (with Bind-In Printed Access Card)

DATABASE SYSTEMS: DESIGN, IMPLEMENTATION, AND MANAGEMENT, NINTH EDITION, a market-leader for database texts, gives readers a solid foundation in practical database design and implementation. The book provides in-depth coverage of database design, demonstrating that the key to successful database implementation is in proper design of databases...

Handbook of Financial Cryptography and Security
Handbook of Financial Cryptography and Security

Cryptography has made a peculiar journey to become a modern science. It had long been associated with the military and with magic. The rst published work in the eld was Steganographia, by an alchemist named Trithemius. Although written earlier, the book was published in 1606. Cryptography has continued this connection with the arcane...

Image and Video Processing in the Compressed Domain
Image and Video Processing in the Compressed Domain

With more and more images and videos being available in the compressed format, researchers have started taking interest in the aspect of designing algorithms for different image operations directly in their domains of representation. This would not only avoid the inverse and forward transformation steps and potentially make the...

Information Optics and Photonics: Algorithms, Systems, and Applications
Information Optics and Photonics: Algorithms, Systems, and Applications

This book will address the advances, applications, research results, and emerging areas of optics, photonics, computational approaches, nano-photonics, bio-photonics, with applications in information systems. The objectives are to bring together novel approaches, analysis, models, and technologies that enhance sensing, measurement,...

iPhoto '11: The Missing Manual (Missing Manuals) (English and English Edition)
iPhoto '11: The Missing Manual (Missing Manuals) (English and English Edition)

In case you haven’t heard, the digital camera market is exploding. At this point, a staggering 98 percent of cameras sold are digital cameras. It’s taken a few decades—the underlying technology used in most digital cameras was invented in 1969—but film photography has been reduced to a niche activity.

...

Collada: Sailing the Gulf of 3d Digital Content Creation
Collada: Sailing the Gulf of 3d Digital Content Creation

In 1963, Ivan Sutherland wrote Sketchpad [57], the world’s fi rst real-time computer graphics application. In that breakthrough effort, he defi ned the basic techniques for structuring scene data that are still present in today’s 3D applications.

In one way, though, Sutherland had it easy. He didn’t have to...

Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems
Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems

As depicted in David Lodge’s celebrated novel Small World, the perceived size of our world experienced a progressive decrease as jet airplanes became affordable to ever greater shares of the earth’s population. Yet, the really dramatic shrinking had to wait until the mid-1990s, when Internet became widespread and the information...

Ordering Disorder: Grid Principles for Web Design (Voices That Matter)
Ordering Disorder: Grid Principles for Web Design (Voices That Matter)

At some level, design can be seen as a method of using creativity to impose tyranny on the world. Not tyranny in its classical sense, but rather tyranny on a much more modest, much more personal scale.

In the progression from problem to idea to solution, the designer may describe what she does in commercial terms (business...

Murach's Java Servlets and JSP, 2nd Edition
Murach's Java Servlets and JSP, 2nd Edition

Ever since the late 1990s when Java servlets and JavaServer Pages (JSPs) came into widespread use, web site developers have been switching from CGI scripting languages to servlets and JSPs. As a result, there has been tremendous growth in the use of servlets and JSPs. Today, there's little doubt that scrvlet and JSP technology is here to...

Result Page: 259 258 257 256 255 254 253 252 251 250 249 248 247 246 245 244 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy