Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Multiobjective Optimization: Interactive and Evolutionary Approaches (Lecture Notes in Computer Science)
Multiobjective Optimization: Interactive and Evolutionary Approaches (Lecture Notes in Computer Science)
Multiobjective optimization deals with solving problems having not only one, but multiple, often conflicting, criteria. Such problems can arise in practically every field of science, engineering and business, and the need for efficient and reliable solution methods is increasing. The task is challenging due to the fact that, instead of a single...
Rome in the Pyrenees
Rome in the Pyrenees
Written by an acknowledged authority on this period and region, this is the first full-length book published in English of the archaeological and historical evidence for an important Roman town in Gaul, Lugdunum in the French Pyrenees, and for its surrounding people the Convenae.

Drawing from the extensive excavation that he has carried out on...

Managing and Mining Graph Data (Advances in Database Systems)
Managing and Mining Graph Data (Advances in Database Systems)

Managing and Mining Graph Data is a comprehensive survey book in graph data analytics. It contains extensive surveys on important graph topics such as graph languages, indexing, clustering, data generation, pattern mining, classification, keyword search, pattern matching, and privacy. It also studies a number of domain-specific...

On-Chip Communication Architectures: System on Chip Interconnect (Systems on Silicon)
On-Chip Communication Architectures: System on Chip Interconnect (Systems on Silicon)

Digital electronic devices such as mobile phones, video game consoles, and network routers typically contain one or more electronic (integrated circuit) chips that are composed of several components such as processors, dedicated hardware engines and memory, and are referred to as system-on-chip (SoC). These SoC designs are rapidly becoming...

Information-Theoretic Methods in Data Science
Information-Theoretic Methods in Data Science
Learn about the state-of-the-art at the interface between information theory and data science with this first unified treatment of the subject. Written by leading experts in a clear, tutorial style, and using consistent notation and definitions throughout, it shows how information-theoretic methods are being used in data acquisition, data...
The Human Hippocampus: Functional Anatomy, Vascularization and Serial Sections with MRI
The Human Hippocampus: Functional Anatomy, Vascularization and Serial Sections with MRI

This book offers a precise description of the anatomy of human hippocampus in view of neurosurgical progress and the wealth of medical imaging methods available. A survey of the current concepts explains the functions of the hippocampus and describes its external and internal vascularisation. Head sections and magnetic resonance images...

Cardiogenic Shock (Contemporary Cardiology)
Cardiogenic Shock (Contemporary Cardiology)

Leading world authorities drawn from cardiology, surgery, pediatrics, internal medicine, and basic science comprehensively survey the diagnostic, therapeutic, and prognostic aspects of cardiogenic shock. These experts describe the different scenarios leading to cardiogenic shock, the ways to diagnose their causes, the unique therapeutic...

American History Through Literature - 1820-1870
American History Through Literature - 1820-1870
This A-Z, cross-referenced and illustrated title provides a unique overview of the critical period that spans the early national era through the Civil War, and which witnessed the birth of a truly American literature. The set features more than 250 survey entries. Subjects include: political topics (Manifest Destiny, Underground Railroad); ideas in...
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book and companion Web site will provide professional penetration testers and security researchers with a fully integrated suite of tools for discovering,...
American History Through Literature 1870-1920
American History Through Literature 1870-1920
This A-Z, cross-referenced and illustrated title provides a unique overview of the period following the Civil War through the emergence of the United States as a world power at the end of World War I. The set features more than 250 survey entries. Subjects include: political topics (Reform, Women's Suffrage); ideas in context (Scientific...
Handbook of Weighted Automata (Monographs in Theoretical Computer Science. An EATCS Series)
Handbook of Weighted Automata (Monographs in Theoretical Computer Science. An EATCS Series)

Weighted finite automata are classical nondeterministic finite automata in which the transitions carry weights. These weights may model, for example, the cost involved when executing a transition, the resources or time needed for this, or the probability or reliability of its successful execution. Weights can also be added to classical automata...

Thirty Essays on Geometric Graph Theory (Algorithms and Combinatorics)
Thirty Essays on Geometric Graph Theory (Algorithms and Combinatorics)

In many applications of graph theory, graphs are regarded as geometric objects drawn in the plane or in some other surface. The traditional methods of "abstract" graph theory are often incapable of providing satisfactory answers to questions arising in such applications. In the past couple of decades, many powerful new combinatorial...

unlimited object storage image
Result Page: 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy