Home | Amazing | Today | Tags | Publishers | Years | Search 
The Art of Computer Programming, Volume 4A: Combinatorial Algorithms, Part 1
The Art of Computer Programming, Volume 4A: Combinatorial Algorithms, Part 1

The TITLE of Volume 4 is Combinatorial Algorithms, and when I proposed it I was strongly inclined to add a subtitle: The Kind of Programming I Like Best. Mv editors have decided to tone down such exuberance, but the fact remains that programs with a combinatorial flavor have always been my favorites.

On the other hand I've...

Semantic Web for the Working Ontologist, Second Edition: Effective Modeling in RDFS and OWL
Semantic Web for the Working Ontologist, Second Edition: Effective Modeling in RDFS and OWL

Since the first edition of Semantic Web for the Working Ontologist came out in June 2008, we have been encouraged by the reception the book has received. Practitioners from a wide variety of industries— health care, energy, environmental science, life sciences, national intelligence, and publishing, to name a few—have told...

Computability Theory: An Introduction to Recursion Theory
Computability Theory: An Introduction to Recursion Theory

The study of the class of computable partial functions (i.e., recursive partial functions) stands at the intersection of three fields: mathematics, theoretical computer science, and philosophy.

Mathematically, computability theory originates from the concept of an algorithm. It leads to a classification of functions according...

Applications of Soft Computing: From Theory to Praxis (Advances in Intelligent and Soft Computing)
Applications of Soft Computing: From Theory to Praxis (Advances in Intelligent and Soft Computing)

The World Soft Computing (WSC) conference is an annual international online conference on applied and theoretical soft computing technology. This WSC 2008 is the thirteenth conference in this series and it has been a great success.

We received a lot of excellent paper submissions which were peer-reviewed by an international...

ATM & MPLS Theory & Application: Foundations of Multi-Service Networking
ATM & MPLS Theory & Application: Foundations of Multi-Service Networking

Why did we decide to update this book on ATM once again? Mainly, because the publisher asked us to! Seriously, though, in the fast moving telecommunications industry, a lot has happened since the publication of the last edition in 1998. In case you have been asleep, Internet-based communication is clearly the killer application for...

Computers and Games: 7th International Conference, CG 2010, Kanazawa, Japan
Computers and Games: 7th International Conference, CG 2010, Kanazawa, Japan

This book contains the papers of the 7th Computer and Games Conference (CG 2010) held in Kanazawa, Japan. The conference took place during September 24–26, 2010 in conjunction with the 15th Computer Olympiad and the 17th World Computer Chess Championship.

The Computer and Games conference series is a major international...

Computer Aided and Integrated Manufacturing Systems, Vol. 1: Computer Techniques
Computer Aided and Integrated Manufacturing Systems, Vol. 1: Computer Techniques

This is an invaluable five-volume reference on the very broad and highly significant subject of computer aided and integrated manufacturing systems. It is a set of distinctly titled and well-harmonized volumes by leading experts on the international scene.

The techniques and technologies used in computer aided and integrated...

Computer Aided And Integrated Manufacturing Systems, Volume 5: Manufacturing Processes
Computer Aided And Integrated Manufacturing Systems, Volume 5: Manufacturing Processes

This is an invaluable five-volume reference on the very broad and highly significant subject of computer aided and integrated manufacturing systems. It is a set of distinctly titled and well-harmonized volumes by leading experts on the international scene.

The techniques and technologies used in computer aided and integrated...

Energy Minimization Methods in Computer Vision and Pattern Recognition: 8th International Conference, EMMCVPR 2011
Energy Minimization Methods in Computer Vision and Pattern Recognition: 8th International Conference, EMMCVPR 2011

Over the last few decades, energy minimization methods have become an established paradigm to resolve a variety of challenges in the fields of computer vision and pattern recognition. While traditional approaches to computer vision were often based on a heuristic sequence of processing steps and merely allowed a very limited...

Studies in Complexity and Cryptography: Miscellanea on the Interplay between Randomness and Computation
Studies in Complexity and Cryptography: Miscellanea on the Interplay between Randomness and Computation

This volume contains a collection of studies in the areas of complexity theory and foundations of cryptography. These studies were conducted at different times during the last couple of decades. Although many of these studies have been referred to by other works, none of them was formally published before.

Indeed, this volume...

Smart Graphics: 11th International Symposium on Smart Graphics, Bremen, Germany, July 18-20, 2011
Smart Graphics: 11th International Symposium on Smart Graphics, Bremen, Germany, July 18-20, 2011

The International Symposium on Smart Graphics serves as a scientific forum that attracts researchers and practitioners from the fields of computer graphics, artificial intelligence, cognitive science, human–computer interaction, interface design, and information visualization. Initiated by Andreas Butz, Antonio Kr¨uger, and...

Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011

On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011). Each year DIMVA brings together international experts from academia, industry and government to present and discuss novel security research....

Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy