Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Neural Simulation Language: A System for Brain Modeling
The Neural Simulation Language: A System for Brain Modeling
The Neural Simulation Language (NSL), developed by Alfredo Weitzenfeld, Michael Arbib, and Amanda Alexander, provides a simulation environment for modular brain modeling. NSL is an object-oriented language offering object-oriented protocols applicable to all levels of neural simulation. One of NSL's main strengths is that it allows for realistic...
Performance Analysis of Queuing and Computer Networks
Performance Analysis of Queuing and Computer Networks
Performance Analysis of Queuing and Computer Networks develops simple models and analytical methods from first principles to evaluate performance metrics of various configurations of computer systems and networks. It presents many concepts and results of probability theory and stochastic processes.

After an introduction to...

Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...

Principles of Model Checking
Principles of Model Checking
Our growing dependence on increasingly complex computer and software systems necessitates the development of formalisms, techniques, and tools for assessing functional properties of these systems. One such technique that has emerged in the last twenty years is model checking, which systematically (and automatically) checks whether a model of a...
Botnets: The Killer Web App
Botnets: The Killer Web App
This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise!

The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world
...
jQuery Cookbook (Animal Guide)
jQuery Cookbook (Animal Guide)
jQuery simplifies building rich, interactive web frontends. Getting started with this JavaScript library is easy, but it can take years to fully realize its breadth and depth; this cookbook shortens the learning curve considerably. With these recipes, you'll learn patterns and practices from 19 leading developers who use jQuery for...
The New York City Subway System (Building America: Then and Now)
The New York City Subway System (Building America: Then and Now)
In 1912, workers digging to create the Broadway Subway, north of Murray Street in lower Manhattan, hit a brick wall approximately 21 feet (6.4 meters) below the street surface. Breaking through the wall, the laborers came upon a tunnel 9 feet (2.7 m) in diameter and lined with eight- inch- thick (20.32 centimeters) bricks. Two rails led into a...
The Fractal Structure of Data Reference: Applications to the Memory Hierarchy
The Fractal Structure of Data Reference: Applications to the Memory Hierarchy
For purposes of understanding its performance, a computer system is traditionally viewed as a processor coupled to one or more disk storage devices, and driven by externally generated requests (typically called transactions). Over the past several decades, very powerful techniques have become available to the performance analyst attempting to...
Essentials of Child Psychopathology (Essentials of Behavioral Science Series)
Essentials of Child Psychopathology (Essentials of Behavioral Science Series)
The only concise, comprehensive overview of child psychopathology covering theory, assessment, and treatment as well as issues and trends

Essentials of Child Psychopathology provides students and professionals with a comprehensive overview of critical conceptual issues in child and adolescent psychopathology. The text covers the major theories,...

Spying Blind: The CIA, the FBI, and the Origins of 9/11
Spying Blind: The CIA, the FBI, and the Origins of 9/11

In this pathbreaking book, Amy Zegart provides the first scholarly examination of the intelligence failures that preceded September 11. Until now, those failures have been attributed largely to individual mistakes. But Zegart shows how and why the intelligence system itself left us vulnerable.

Zegart argues that after the Cold War...

Human-in-the-Loop Simulations: Methods and Practice
Human-in-the-Loop Simulations: Methods and Practice

Both the editors of this book were exposed to human-in-the-loop simulations while pursuing their doctoral degrees in the Center for Human-Machine Systems at Georgia Tech. In fact, S. Narayanan served as Ling Rothrock’s teaching assistant for the simulation course taught by Prof. Christine Mitchell. It has been over 15 years...

A UML Pattern Language (Macmillan Technology Series)
A UML Pattern Language (Macmillan Technology Series)

This book is about how to model software systems and how to use those models. It is rooted in that emerging intellectual "ecosystem" comprising the various networks (the Internet, intranets, extranets, and so on), distributed objects, piecemeal development based on short development cycles, and something called...

unlimited object storage image
Result Page: 684 683 682 681 680 679 678 677 676 675 674 673 672 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy