Home | Amazing | Today | Tags | Publishers | Years | Search 
Algorithmic Randomness and Complexity (Theory and Applications of Computability)
Algorithmic Randomness and Complexity (Theory and Applications of Computability)

Though we did not know it at the time, this book’s genesis began with the arrival of Cris Calude in New Zealand. Cris has always had an intense interest in algorithmic information theory. The event that led to much of the recent research presented here was the articulation by Cris of a seemingly innocuous question. This question...

Junos Enterprise Routing: A Practical Guide to Junos Routing and Certification
Junos Enterprise Routing: A Practical Guide to Junos Routing and Certification

The world of enterprise routing with Juniper Networks devices is getting very exciting—new technologies, products, and network developments are making the enterprise network environment one of the most dynamic places to be. However, we, the authors, hope to focus that energy by providing you with a detailed and practical...

Logical Aspects of Computational Linguistics: 6th International Conference, LACL 2011
Logical Aspects of Computational Linguistics: 6th International Conference, LACL 2011

This volume contains the proceedings of the 6th International Conference on Logical Aspects of Computational Linguistics 2011 (LACL 2011), held June 29- July 1, 2011 in Montpellier, France. The LACL conferences aim at providing a forum for the presentation and discussion of current research in all the formal and logical aspects of...

Computational Methods for Modeling of Nonlinear Systems, Volume 118 (Mathematics in Science and Engineering)
Computational Methods for Modeling of Nonlinear Systems, Volume 118 (Mathematics in Science and Engineering)

In this book, we study theoretical and practical aspects of computing methods for mathematical modelling of nonlinear systems. A number of computing techniques are considered, such as methods of operator approximation with any given accuracy; operator interpolation techniques including a non-Lagrange interpolation; methods of system...

Approximation Algorithms for NP-Hard Problems
Approximation Algorithms for NP-Hard Problems

Approximation algorithms have developed in response to the impossibility of solving a great variety of important optimization problems. Too frequently, when attempting to get a solution for a problem, one is confronted with the fact that the problem is NP-haid. This, in the words of Garey and Johnson, means "I can't find an...

Meta-Learning in Computational Intelligence (Studies in Computational Intelligence)
Meta-Learning in Computational Intelligence (Studies in Computational Intelligence)

In the early days of pattern recognition and statistical data analysis life was rather simple: datasets were relatively small, collected from well-designed experiments, analyzed using a few methods that had good theoretical background. Explosive growth of the use of computers led to the creation of huge amounts of data of all kinds,...

Algebraic Specification of Communication Protocols (Cambridge Tracts in Theoretical Computer Science)
Algebraic Specification of Communication Protocols (Cambridge Tracts in Theoretical Computer Science)

The specifications in this book are the result of a number of case studies performed by researchers from the Programming Research Group at the University of Amsterdam. The primary goal was to study the use of the techniques developed by the Programming Research Group for the specification of real-life protocols. From the pool of...

Handbook of FPGA Design Security
Handbook of FPGA Design Security

The purpose of this book is to provide a practical approach to managing security in FPGA designs for researchers and practitioners in the electronic design automation (EDA) and FPGA communities, including corporations, industrial and government research labs, and academics. This book combines theoretical underpinnings with a practical...

Algorithms for Approximation: Proceedings of the 5th International Conference, Chester, July 2005
Algorithms for Approximation: Proceedings of the 5th International Conference, Chester, July 2005

Approximation methods are of vital importance in many challenging applications from computational science and engineering. This book collects papers from world experts in a broad variety of relevant applications of approximation theory, including pattern recognition and machine learning, multiscale modelling of fluid flow, metrology,...

Tools and Algorithms for the Construction and Analysis of Systems: 17th International Conference
Tools and Algorithms for the Construction and Analysis of Systems: 17th International Conference

This volume contains the proceedings of the 17th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2011). TACAS 2011 took place in Saarbr¨ucken, Germany, March 28–31, 2011, as part of the 14th European Joint Conferences on Theory and Practice of Software (ETAPS 2011), whose...

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Python is a hacker's language. With its decreasejd complexity, increased efficiency, limitless third-party libraries, and low bar to entry, Python provides an excellent development platform to build your own offensive tools. If you are running Mac OS X or Linux, odds are it is already installed on your system. While a wealth of offensive...

Fundamentals of Electric Circuits
Fundamentals of Electric Circuits

You may be wondering why we chose a photo of astronauts working in space on the Space Station for the cover. We actually chose it for several reasons. Obviously, it is very exciting; in fact, space represents the most exciting frontier for the entire world! In addition, much of the station itself consists of all kinds of circuits! One...

Result Page: 174 173 172 171 170 169 168 167 166 165 164 163 162 161 160 159 158 157 156 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy