Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Protocols for Multislice CT
Protocols for Multislice CT

This book provides structured up-to-date information on all routine protocols used for multislice (multidetector row) CT. The volume contains a detailed technical section and covers the prevailing investigations of the brain, neck, lungs and chest, abdomen with parenchymal organs and gastrointestinal tract, the musculoskeletal system and CTA...

Privacy and Security for Cloud Computing (Computer Communications and Networks)
Privacy and Security for Cloud Computing (Computer Communications and Networks)

This book analyzes the latest advances in privacy, security and risk technologies within cloud environments. With contributions from leading experts, the text presents both a solid overview of the field and novel, cutting-edge research. A Glossary is also included at the end of the book. Topics and features: considers the various forensic...

Parallel Programming: for Multicore and Cluster Systems
Parallel Programming: for Multicore and Cluster Systems

Innovations in hardware architecture, like hyper-threading or multicore processors, mean that parallel computing resources are available for inexpensive desktop computers. In only a few years, many standard software products will be based on concepts of parallel programming implemented on such hardware, and the range of applications will be...

Advanced Network Programming – Principles and Techniques: Network Application Programming with Java (Computer Communications and Networks)
Advanced Network Programming – Principles and Techniques: Network Application Programming with Java (Computer Communications and Networks)

Answering the need for an accessible overview of the field, this text/reference presents a manageable introduction to both the theoretical and practical aspects of computer networks and network programming. Clearly structured and easy to follow, the book describes cutting-edge developments in network architectures, communication protocols,...

Bioinformatics and Computational Biology Solutions Using R and Bioconductor (Statistics for Biology and Health)
Bioinformatics and Computational Biology Solutions Using R and Bioconductor (Statistics for Biology and Health)

Full four-color book.

Some of the editors created the Bioconductor project and Robert Gentleman is one of the two originators of R.

All methods are illustrated with publicly available data, and a major section of the book is devoted to fully worked case studies.

Code underlying all of the computations that are...

Active Rules in Database Systems (Monographs in Computer Science)
Active Rules in Database Systems (Monographs in Computer Science)
A timely survey of the field from the point of view of some of the subject's most active researchers. Divided into several parts organized by theme, the book first covers the underlying methodology regarding active rules, followed by formal specification, rule analysis, performance analysis, and support tools. It then moves on to the...
Robot 2019: Fourth Iberian Robotics Conference: Advances in Robotics, Volume 1 (Advances in Intelligent Systems and Computing)
Robot 2019: Fourth Iberian Robotics Conference: Advances in Robotics, Volume 1 (Advances in Intelligent Systems and Computing)

This book gathers a selection of papers presented at ROBOT 2019 – the Fourth Iberian Robotics Conference, held in Porto, Portugal, on November 20th–22nd, 2019. ROBOT 2019 is part of a series of conferences jointly organized by the SPR – Sociedade Portuguesa de Robótica (Portuguese Society for Robotics) and...

Interactions Between Computational Intelligence and Mathematics Part 2 (Studies in Computational Intelligence)
Interactions Between Computational Intelligence and Mathematics Part 2 (Studies in Computational Intelligence)

This book presents recent research in the field of interaction between computational intelligence and mathematics. In the current technological age, we face the challenges of tackling very complex problems – in the usual sense, but also in the mathematical and theoretical computer science sense. However, even the most...

Post-Silicon Validation and Debug
Post-Silicon Validation and Debug

This book provides a comprehensive coverage of System-on-Chip (SoC) post-silicon validation and debug challenges and state-of-the-art solutions with contributions from SoC designers, academic researchers as well as SoC verification experts.  The readers will get a clear understanding of the existing debug infrastructure and how...

Herbicide Residue Research in India (Environmental Chemistry for a Sustainable World, 12)
Herbicide Residue Research in India (Environmental Chemistry for a Sustainable World, 12)

Herbicides constitute about 60% of the total pesticides consumed globally. In India, the use of herbicides started initially in tea gardens and picked up in the 1970s, when the high-yielding varieties of rice and wheat were introduced. Presently, 67 herbicides are registered in the country for controlling weeds in crops including...

Empirically Engaged Evolutionary Ethics (Synthese Library, 437)
Empirically Engaged Evolutionary Ethics (Synthese Library, 437)

A growing body of evidence from the sciences suggests that our moral beliefs have an evolutionary basis. To explain how human morality evolved, some philosophers have called for the study of morality to be naturalized, i.e., to explain it in terms of natural causes by looking at its historical and biological origins. The present...

Computer Network Security
Computer Network Security
A comprehensive survey of computer network security concepts, methods, and practices. This authoritative volume provides an optimal description of the principles and applications of computer network security in particular, and cyberspace security in general. The book is thematically divided into three segments: Part I describes the operation and...
unlimited object storage image
Result Page: 398 397 396 395 394 393 392 391 390 389 388 387 386 385 384 383 382 381 380 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy