Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Casimir Effect
The Casimir Effect
"... the book is very comprehensive, clearly written and filled with wonderful physics." -- CERN Courier, Mar 2002

"Milton's attractively slim book will guide the serious beginner and its analytical rigor should also attract experienced theorists" -- Physics Today, Jan 2003
...
Anti-Social Behaviour
Anti-Social Behaviour
    From the Daily Mail's claim of Britain being named ‘Yob Capital of Europe’, to the headline in The Times of ‘Tearaway given ASBO at 10’, the subject of anti-social behaviour has been given a huge amount of political, social, media, public policy and academic interest in recent years.

    ...

The Pillars of Computation Theory: State, Encoding, Nondeterminism (Universitext)
The Pillars of Computation Theory: State, Encoding, Nondeterminism (Universitext)

The abstract branch of theoretical computer science known as Computation Theory typically appears in undergraduate academic curricula in a form that obscures both the mathematical concepts that are central to the various components of the theory and the relevance of the theory to the typical student. This regrettable situation is due largely...

Efficient Algorithms for Listing Combinatorial Structures (Distinguished Dissertations in Computer Science)
Efficient Algorithms for Listing Combinatorial Structures (Distinguished Dissertations in Computer Science)

This thesis is concerned with the design of efficient algorithms for listing combinatorial structures. The research described here gives some answers to the following questions: which families of combinatorial structures have fast computer algorithms for listing their members, What general methods are useful for listing combinatorial...

Advanced Computational Methods for Knowledge Engineering: Proceedings of the 6th International Conference on Computer Science, Applied Mathematics and ... in Intelligent Systems and Computing)
Advanced Computational Methods for Knowledge Engineering: Proceedings of the 6th International Conference on Computer Science, Applied Mathematics and ... in Intelligent Systems and Computing)

This proceedings book contains 37 papers selected from the submissions to the 6th International Conference on Computer Science, Applied Mathematics and Applications (ICCSAMA 2019), which was held on 19–20 December, 2019, in Hanoi, Vietnam. The book covers theoretical and algorithmic as well as practical issues connected with...

Java Deployment with JNLP and WebStart
Java Deployment with JNLP and WebStart

Java Deployment takes a very practical approach to the topic of deploying Java applications. First, the book presents the major deployment concerns a Java developer faces and addresses the most common deployment scenarios. Next, the book addresses deployment issues the developer faces while coding a project. Finally, the book presents...

Electronic Commerce: Theory and Practice (Studies in Computational Intelligence)
Electronic Commerce: Theory and Practice (Studies in Computational Intelligence)
Electronic Commerce technologies have been studied widely in the field of Economics and Informatics. In recent years, there are multiple aspects of researches in electronic commerce including supply chain model, Internet auctions, Internet volume discounts, electronic bank and stock trading, and several others. The increase of Electronic Commerce...
The Ethics of Computer Games
The Ethics of Computer Games
Despite the emergence of computer games as a dominant cultural industry (and the accompanying emergence of computer games as the subject of scholarly research), we know little or nothing about the ethics of computer games. Considerations of the morality of computer games seldom go beyond intermittent portrayals of them in the mass media as training...
Electrochemistry of Porous Materials
Electrochemistry of Porous Materials

Porous materials continue to attract considerable attention because of their wide variety of scientific and technological applications, such as catalysis, shape- and size-selective absorption and adsorption, gas storage, and electrode materials. Both research and applications of porous materials—via electroanalysis, electrosynthesis,...

Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011

On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011). Each year DIMVA brings together international experts from academia, industry and government to present and discuss novel security research....

Computational Linguistics and Talking Robots: Processing Content in Database Semantics
Computational Linguistics and Talking Robots: Processing Content in Database Semantics

The practical task of building a talking robot requires a theory of how natural language communication works. Conversely, the best way to computationally verify a theory of natural language communication is to demonstrate its functioning concretely in the form of a talking robot, the epitome of human–machine communication. To...

Mining the Web: Analysis of Hypertext and Semi Structured Data (The Morgan Kaufmann Series in Data Management Systems)
Mining the Web: Analysis of Hypertext and Semi Structured Data (The Morgan Kaufmann Series in Data Management Systems)
Mining the Web: Discovering Knowledge from Hypertext Data is the first book devoted entirely to techniques for extracting and producing knowledge from the vast body of unstructured Web data. Building on an initial survey of infrastructural issuesincluding Web crawling and indexingChakrabarti examines machine learning techniques as...
unlimited object storage image
Result Page: 159 158 157 156 155 154 153 152 151 150 149 148 147 146 145 144 143 142 141 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy