Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Coding and Cryptology: Proceedings of the International Workshop, Wuyi Mountain, Fujian, China, 11-15 June 2007
Coding and Cryptology: Proceedings of the International Workshop, Wuyi Mountain, Fujian, China, 11-15 June 2007
The rst International Workshop on Coding and Cryptology was held in Wuyi Mountain, Fujian, China, June 11 - 15, 2007. The workshop was organised by Fujian Normal University, China and Nanyang Technological University, Singapore. We acknowledge with gratitude the nancial support from the Key Laboratory of Network Security and Cryptology, Fujian...
Passive, Active, and Digital Filters (The Circuits and Filters Handbook)
Passive, Active, and Digital Filters (The Circuits and Filters Handbook)

Culled from the pages of CRC's highly successful, best-selling The Circuits and Filters Handbook, Second Edition, Passive, Active, and Digital Filters presents a sharply focused, comprehensive review of the fundamental theory behind professional applications of these complex filters. It supplies a concise, convenient reference to the key...

Adaptive Control Approach for Software Quality Improvement (Series on Software Engineering & Knowledge Engineering)
Adaptive Control Approach for Software Quality Improvement (Series on Software Engineering & Knowledge Engineering)
The expansion of our reliance on software in many aspects of modern society has coincided with a number of incidents in aeronautics, astronautics, transportation, medical devices, energy generation, banking and finance. Failures caused by software have introduced more than just inconvenience, but significant property damage,...
Reliability-Based Design in Geotechnical Engineering: Computations and Applications
Reliability-Based Design in Geotechnical Engineering: Computations and Applications

Reliability-based design is the only engineering methodology currently available which can ensure self-consistency in both physical and probabilistic terms.  It is also uniquely compatible with the theoretical basis underlying other disciplines such as structural design. It is especially relevant as geotechnical design becomes subject to...

Mining and Control of Network Traffic by Computational Intelligence (Studies in Computational Intelligence)
Mining and Control of Network Traffic by Computational Intelligence (Studies in Computational Intelligence)

As other complex systems in social and natural sciences as well as in engineering, the Internet is hard to understand from a technical point of view. Packet switched networks defy analytical modeling. The Internet is an outstanding and challenging case because of its fast development, unparalleled heterogeneity and the inherent lack of...

Queer Embodiment: Monstrosity, Medical Violence, and Intersex Experience (Expanding Frontiers: Interdisciplinary Approaches to Studies of Women, Gender, and Sexuality)
Queer Embodiment: Monstrosity, Medical Violence, and Intersex Experience (Expanding Frontiers: Interdisciplinary Approaches to Studies of Women, Gender, and Sexuality)
Merging critical theory, autobiography, and sexological archival research, Queer Embodiment provides insight into what it means, and has meant, to have a legible body in the West. Hilary Malatino explores how and why intersexuality became an anomalous embodiment requiring correction and how contesting this pathologization...
Modern Project Management : Successfully Integrating Project Management Knowledge Areas and Processes
Modern Project Management : Successfully Integrating Project Management Knowledge Areas and Processes
Combining the practical with the theoretical, this is a powerful new approach to managing complex projects.

For project managers in charge of complicated, 10-person-plus projects, one of the best ways to take control and produce predictable, repeatable results is to focus on both complex theory and practical
...
Conformal Array Antenna Theory and Design (IEEE Press Series on Electromagnetic Wave Theory)
Conformal Array Antenna Theory and Design (IEEE Press Series on Electromagnetic Wave Theory)

This publication is the first comprehensive treatment of conformal antenna arrays from an engineering perspective. There are journal and conference papers that treat the field of conformal antenna arrays, but they are typically theoretical in nature. While providing a thorough foundation in theory, the authors of this publication provide readers...

Visual Basic for Applications Unleashed
Visual Basic for Applications Unleashed
Other Office products were slowly brought into the VBA fold, but it’s only with the release of Office 97 that Microsoft has finally achieved its goal. Now all of the Big Four—Word, Excel, Access, and PowerPoint—have a VBA development environment at their core. Not only that, but just about ...
How to Think About Algorithms
How to Think About Algorithms
There are many algorithm texts that provide lots of well-polished code and proofs of correctness. This book is not one of them. Instead, this book presents insights, notations, and analogies to help the novice describe and think about algorithms like an expert. By looking at both the big picture and easy step-by-step methods for developing...
Generalized Convexity and Optimization: Theory and Applications (Lecture Notes in Economics and Mathematical Systems)
Generalized Convexity and Optimization: Theory and Applications (Lecture Notes in Economics and Mathematical Systems)
The authors have written a rigorous yet elementary and self-contained book to present, in a unified framework, generalized convex functions, which are the many non-convex functions that share at least one of the valuable properties of convex functions and which are often more suitable for describing real-world problems. The book will be a useful...
Risk Management and Value Creation in Financial Institutions
Risk Management and Value Creation in Financial Institutions
From an empirical as well as a personal point of view, risk management in the financial industry has been one of the most exciting and most researched areas over the last decade. Depositors and regulators claim that risk management is necessary, and many banks argue that superior risk management can create (shareholder) value. However, from a...
unlimited object storage image
Result Page: 156 155 154 153 152 151 150 149 148 147 146 145 144 143 142 141 140 139 138 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy