Home | Amazing | Today | Tags | Publishers | Years | Search 
Anonymous Communication Networks: Protecting Privacy on the Web
Anonymous Communication Networks: Protecting Privacy on the Web

In today’s interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.

Addressing the demand for authoritative information on
...

Theories of Programming and Formal Methods: Essays Dedicated to Jifeng He on the Occasion of His 70th Birthday (Lecture Notes in Computer Science)
Theories of Programming and Formal Methods: Essays Dedicated to Jifeng He on the Occasion of His 70th Birthday (Lecture Notes in Computer Science)

This Festschrift volume, dedicated to He Jifeng on the occasion of his 70th birthday in September 2013, includes 24 refereed papers by leading researchers, current and former colleagues, who congratulated at a celebratory symposium held in Shanghai, China, in the course of the 10th International Colloquium on Theoretical Aspects of Computing,...

Rolling Out 5G: Use Cases, Applications, and Technology Solutions
Rolling Out 5G: Use Cases, Applications, and Technology Solutions

Examine the challenges of 4G in the light of impending and crucial future communication needs, and review the lessons learned from an implementation and system operation perspective with an eye towards the next generation – 5G. You'll investigate key changes and additions to 5G in terms of use cases. You'll also learn about the...

Mastering Machine Learning With scikit-learn
Mastering Machine Learning With scikit-learn

Apply effective learning algorithms to real-world problems using scikit-learn

About This Book

  • Design and troubleshoot machine learning systems for common tasks including regression, classification, and clustering
  • Acquaint yourself with popular machine learning algorithms, including...
No Nonsense XML Web Development With PHP: Master PHP 5's Powerful New XML Functionality
No Nonsense XML Web Development With PHP: Master PHP 5's Powerful New XML Functionality

A practical and concise book that teaches XML from the ground up. This tutorial style presents various XML methodologies and techniques in an easy to understand way, building a basis for further exploration.

XML is essentially an enabling technology, dry and boring on its own. As a result, most books on the market are...

Information Security Science: Measuring the Vulnerability to Data Compromises
Information Security Science: Measuring the Vulnerability to Data Compromises

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically...

Workflows: Expanding Architecture's Territory in the Design and Delivery of Buildings (Architectural Design)
Workflows: Expanding Architecture's Territory in the Design and Delivery of Buildings (Architectural Design)

Workflows are being rethought and remodelled across the architecture, engineering and construction (AEC) spectrum. The synthesis of building information modelling (BIM) platforms with digital simulation techniques and increasing access to data, charting building performance, is allowing architects to engage in the generation of new workflows...

Graph Theory, Combinatorics and Algorithms: Interdisciplinary Applications (Operations Research / Computer Science Interfaces Series)
Graph Theory, Combinatorics and Algorithms: Interdisciplinary Applications (Operations Research / Computer Science Interfaces Series)

Graph Theory, Combinatorics and Algorithms: Interdisciplinary Applications focuses on discrete mathematics and combinatorial algorithms interacting with real world problems in computer science, operations research, applied mathematics and engineering. The book contains eleven chapters written by...

Data Mining in Proteomics: From Standards to Applications (Methods in Molecular Biology)
Data Mining in Proteomics: From Standards to Applications (Methods in Molecular Biology)

Through the rapid development of proteomics methods and technologies, an enormous amount of data was created, leading to a wide-spread rethinking of strategy design and data interpretation. In Data Mining in Proteomics: From Standards to Applications, experts in the field present these new insights within the proteomics community, taking the...

Programming Multicore and Many-core Computing Systems (Wiley Series on Parallel and Distributed Computing)
Programming Multicore and Many-core Computing Systems (Wiley Series on Parallel and Distributed Computing)

Programming multi-core and many-core computing systems

Sabri Pllana, Linnaeus University, Sweden

Fatos Xhafa, Technical University of Catalonia, Spain

Provides state-of-the-art methods for programming multi-core and many-core systems

The book comprises a selection of twenty two...

Bandwidth Efficient Coding (IEEE Series on Digital & Mobile Communication)
Bandwidth Efficient Coding (IEEE Series on Digital & Mobile Communication)

This book addresses coding, a new solution to the major challenge of communicating more bits of information in the same radio spectrum.

  • Explores concepts and new transmission methods that have arisen in the last 15 years
  • Discusses the method of faster than Nyquist signaling
  • ...
Circuit Analysis II With Matlab Applications
Circuit Analysis II With Matlab Applications

This text is written for use in a second course in circuit analysis. The reader of this book should have the traditional undergraduate knowledge of an introductory circuit analysis material such as Circuit Analysis I with MATLAB® Applications by this author. Another prerequisite would be knowledge of differential equations, and in most...

Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy