Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Burrows-Wheeler Transform: Data Compression, Suffix Arrays, and Pattern Matching
The Burrows-Wheeler Transform: Data Compression, Suffix Arrays, and Pattern Matching
The Burrows-Wheeler Transform is a text transformation scheme that has found applications in different aspects of the data explosion problem, from data compression to index structures and search. The BWT belongs to a new class of compression algorithms, distinguished by its ability to perform compression by sorted contexts. More recently, the BWT...
Non-Binary Error Control Coding for Wireless Communication and Data Storage
Non-Binary Error Control Coding for Wireless Communication and Data Storage

Comprehensive introduction to non-binary error-correction coding techniques

Non-Binary Error Control Coding for Wireless Communication and Data Storage explores non-binary coding schemes that have been developed to provide an alternative to the Reed – Solomon codes, which are expected to become unsuitable for...

Software Testing: An ISTQB-ISEB Foundation Guide
Software Testing: An ISTQB-ISEB Foundation Guide

The Information Systems Examination Board (ISEB) of BCS (www.bcs.org.uk/iseb) instigated the Foundation Certificate in Software Testing in 1998; since then over 40,000 Foundation Certificates have been awarded. An intermediate level qualification was introduced in 2007 as a step towards the more advanced Practitioner...

Variation-Aware Adaptive Voltage Scaling for Digital CMOS Circuits (Springer Series in Advanced Microelectronics)
Variation-Aware Adaptive Voltage Scaling for Digital CMOS Circuits (Springer Series in Advanced Microelectronics)

Increasing performance demands in integrated circuits, together with limited energy budgets, force IC designers to find new ways of saving power. One innovative way is the presented adaptive voltage scaling scheme, which tunes the supply voltage according to the present process, voltage and temperature variations as well as aging. The voltage...

Security-aware Cooperation in Cognitive Radio Networks (SpringerBriefs in Computer Science)
Security-aware Cooperation in Cognitive Radio Networks (SpringerBriefs in Computer Science)

This brief investigates spectrum efficient and energy efficient strategies, known as cognitive radio networks (CRNs), to ensure secure cooperation between licensed and unlicensed users. The authors address issues of spectrum scarcity, spectrum sensing, transmission performance, trust-aware cooperation, and secure communications. Two...

Advanced Encryption Standard - AES: 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004
Advanced Encryption Standard - AES: 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004
This book constГ­tutes the thoroughly refereed postproceedings of the 4th International Conference on the Advanced Encryption Standard, AES 2004, held in Bonn, Germany in May 2004. The 10 revised full papers presented together with an introductory survey and 4 invited papers by leading researchers were carefully selected during two rounds of...
Cage-based Performance Capture (Studies in Computational Intelligence)
Cage-based Performance Capture (Studies in Computational Intelligence)

Nowadays, highly-detailed animations of live-actor performances are increasingly easier to acquire and 3D Video has reached considerable attentions in visual media production. In this book, we address the problem of extracting or acquiring and then reusing non-rigid parametrization for video-based animations. At first sight, a crucial...

Applied Cryptography in .NET and Azure Key Vault: A Practical Guide to Encryption in .NET and .NET Core
Applied Cryptography in .NET and Azure Key Vault: A Practical Guide to Encryption in .NET and .NET Core
Benefit from Microsoft's robust suite of security and cryptography primitives to create a complete, hybrid encryption scheme that will protect your data against breaches. This highly practical book teaches you how to use the .NET encryption APIs and Azure Key Vault, and how they can work together to produce a robust...
Turbo Code Applications: a Journey from a Paper to realization
Turbo Code Applications: a Journey from a Paper to realization
With the excellent performance compared to that of other existing codes, turbo code and its successors have been adopted into many communication systems and incorporated with various industrial standards. To celebrate another communication engineering milestone, leading experts present together with the contemporary applications of most modern...
Web Site Cookbook : Solutions & Examples for Building and Administering Your Web Site
Web Site Cookbook : Solutions & Examples for Building and Administering Your Web Site

The total number of web pages today has been estimated at over 3 billion, spanning millions of individual websites. Not surprisingly, there is tremendous pressure on web developers and designers to remain current with the latest technologies.

The Web Site Cookbook from O'Reilly covers all the
...
Learning Classifier Systems: 11th International Workshop, IWLCS 2008
Learning Classifier Systems: 11th International Workshop, IWLCS 2008

Learning Classifier Systems (LCS) constitute a fascinating concept at the intersection of machine learning and evolutionary computation. LCS’s genetic search, generally in combination with reinforcement learning techniques, can be applied to both temporal and spatial problem-solving and promotes powerful search in a wide variety of...

Purely Functional Data Structures
Purely Functional Data Structures

Most books on data structures assume an imperative language such as C or C++. However, data structures for these languages do not always translate well to functional languages such as Standard ML, Haskell, or Scheme. This book describes data structures from the point of view of functional languages, with examples, and presents design...

unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy