Home | Amazing | Today | Tags | Publishers | Years | Search 
Handbook of Parallel Computing: Models, Algorithms and Applications (Chapman & Hall/Crc Computer & Information Science Series)
Handbook of Parallel Computing: Models, Algorithms and Applications (Chapman & Hall/Crc Computer & Information Science Series)
We live in an era in which parallel computing has become mainstream and very affordable. This is mainly because hardware costs have come down rapidly. With the advent of the Internet, we also experience the phenomenon of data explosion in every application of interest. Processing voluminous datasets is highly computation intensive. Parallel...
Analytical Electrochemistry
Analytical Electrochemistry

The critically acclaimed guide to the principles, techniques, and instruments of electroanalytical chemistry–now expanded and revised

Joseph Wang, internationally renowned authority on electroanalytical techniques, thoroughly revises his acclaimed book to reflect the rapid growth the field has experienced in recent years. He...

Sams Teach Yourself Samba in 24 Hours
Sams Teach Yourself Samba in 24 Hours
Sams Teach Yourself Samba in 24 Hours is a tutorial designed to help you integrate Linux/UNIX-based systems with Windows-based systems. It has all the information and tools necessary for you to be up and running with Samba in 24 short lessons. Learn how to use Samba to its fullest potential. Topics range from introducing Samba and Samba...
Multimedia Services in Intelligent Environments: Advanced Tools and Methodologies (Studies in Computational Intelligence)
Multimedia Services in Intelligent Environments: Advanced Tools and Methodologies (Studies in Computational Intelligence)
Multimedia services involve processing, transmission and retrieval of multiple forms of information. Multimedia services have gained momentum in the past few years due to the easy availability of computing power and storage media. Society is demanding human-like intelligent behaviour, such as adaptation and generalization, from machines every day....
Global Positioning: Technologies and Performance (Wiley Survival Guides in Engineering and Science)
Global Positioning: Technologies and Performance (Wiley Survival Guides in Engineering and Science)

The field of radionavigation signals and systems has seen significant growth in recent years. Satellite systems are very efficient, but owing to their limited exposure and/or availability in some environments, they do not cover the whole spectrum of applications. Thus, many other positioning techniques are being developed.

Now,...

Network Infrastructure and Architecture: Designing High-Availability Networks
Network Infrastructure and Architecture: Designing High-Availability Networks
A Comprehensive, Thorough Introduction to High-Speed Networking Technologies and Protocols

Network Infrastructure and Architecture: Designing High-Availability Networks takes a unique approach to the subject by covering the ideas underlying networks, the architecture of the network elements, and the implementation of these elements in optical...

Linear and Nonlinear Programming: Third Edition (International Series in Operations Research & Management Science)
Linear and Nonlinear Programming: Third Edition (International Series in Operations Research & Management Science)
"Linear and Nonlinear Programming" is considered a classic textbook in Optimization. While it is a classic, it also reflects modern theoretical insights. These insights provide structure to what might otherwise be simply a collection of techniques and results, and this is valuable both as a means for learning existing material and for...
The Burrows-Wheeler Transform: Data Compression, Suffix Arrays, and Pattern Matching
The Burrows-Wheeler Transform: Data Compression, Suffix Arrays, and Pattern Matching
The Burrows-Wheeler Transform is a text transformation scheme that has found applications in different aspects of the data explosion problem, from data compression to index structures and search. The BWT belongs to a new class of compression algorithms, distinguished by its ability to perform compression by sorted contexts. More recently, the BWT...
Global IPv6 Strategies: From Business Analysis to Operational Planning (Network Business)
Global IPv6 Strategies: From Business Analysis to Operational Planning (Network Business)
Every year, organizations rely on Internet applications and services more deeply–and every year, Internet infrastructure grows more powerful and complex. As the limitations of traditional IPv4 addressing become increasingly apparent, many decision makers recognize that a transition to IPv6 is needed far sooner than anticipated. Global...
Classical and New Paradigms of Computation and their Complexity Hierarchies
Classical and New Paradigms of Computation and their Complexity Hierarchies
The notion of complexity is an important contribution of logic to theoretical computer science and mathematics. This volume attempts to approach complexity in a holistic way, investigating mathematical properties of complexity hierarchies at the same time as discussing algorithms and computational properties. A main focus of the volume is on some...
Ada 2005 Rationale: The Language, The Standard Libraries (Lecture Notes in Computer Science)
Ada 2005 Rationale: The Language, The Standard Libraries (Lecture Notes in Computer Science)
Ada 2005 is the latest version of the International Standard for the programming language Ada. Formally, it is an Amendment of ISO/IEC 8652:1995 (E) rather than a completely new standard. The primary goals for the new version were to enhance its capabilities particularly in those areas where its reliability and predictability are of great value....
New Stream Cipher Designs: The eSTREAM Finalists (Lecture Notes in Computer Science)
New Stream Cipher Designs: The eSTREAM Finalists (Lecture Notes in Computer Science)
The question “Streamciphers: dead or alive?” was posed by Adi Shamir. Intended to provoke debate, the question could not have been better, or more starkly, put. However, it was not Shamir’s intention to suggest that stream ciphers themselves were obsolete; rather he was questioning whether stream ciphers of a dedicated design were...
Result Page: 402 401 400 399 398 397 396 395 394 393 392 391 390 389 388 387 386 385 384 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy