Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Combinatorial Algorithms for Computers and Calculators (Computer science and applied mathematics)
Combinatorial Algorithms for Computers and Calculators (Computer science and applied mathematics)

Since the appearance in 1975 of this work, the field of combinatorial algorithms has continued its rapid evolution. We have substantially rewritten several of the chapters in order to take account of theoretical or algorithmic improvements, and to clarify the presentation.

The result has been that a number of speedups,
...

Theories of Information, Communication and Knowledge: A Multidisciplinary Approach
Theories of Information, Communication and Knowledge: A Multidisciplinary Approach

This book addresses some of the key questions that scientists have been asking themselves for centuries: what is knowledge? What is information? How do we know that we know something? How do we construct meaning from the perceptions of things? Although no consensus exists on a common definition of the concepts of information and...

Promoting Balanced Competitiveness Strategies of Firms in Developing Countries (Innovation, Technology, and Knowledge Management)
Promoting Balanced Competitiveness Strategies of Firms in Developing Countries (Innovation, Technology, and Knowledge Management)

Since the pioneering work of Joseph Schumpeter (1942), it has been assumed that innovations typically play a key role in firms’ competitiveness.  This assumption has been applied to firms in both developed and developing countries. However, the innovative capacities and business environments of firms in developing countries are...

Cellular Automata and Discrete Complex Systems: 19th International Workshop, AUTOMATA 2013, Gießen, Germany, September 14-19, 2013, Proceedings (Lecture Notes in Computer Science)
Cellular Automata and Discrete Complex Systems: 19th International Workshop, AUTOMATA 2013, Gießen, Germany, September 14-19, 2013, Proceedings (Lecture Notes in Computer Science)

The volume LNCS 8155 constitutes the refereed proceedings of the 19th International Workshop on Cellular Automata and Discrete Complex Systems, AUTOMATA 2013, held in Giessen, Germany, in September 2013. The 8 papers presented were carefully reviewed and selected from 26 submissions. The scope of the workshop spans the following areas the...

Data Mining Tools for Malware Detection
Data Mining Tools for Malware Detection

Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop...

Birth of the Binge: Serial TV and the End of Leisure (Contemporary Approaches to Film and Media Series)
Birth of the Binge: Serial TV and the End of Leisure (Contemporary Approaches to Film and Media Series)

Birth of the Binge: Serial TV and the End of Leisure describes and details serial television and "binge watching," the exceedingly popular form of contemporary television viewing that has come to dominance over the past decade. Author Dennis Broe looks at this practice of media consumption by suggesting that...

Introduction to Computer Security
Introduction to Computer Security

In this authoritative book, widely respected practitioner and teacher Matt Bishop presents a clear and useful introduction to the art and science of information security. Bishop's insights and realistic examples will help any practitioner or student understand the crucial links between security theory and the day-to-day security...

Learning Maya 6 Rendering
Learning Maya 6 Rendering
Learning Maya 6: Rendering is your resource for creating dazzling imagery in Maya. Get hands-on experience with the power of the Maya rendering engine and mental ray for Maya as you set lights and cameras to your scenes, apply materials and textures to your models, create shading networks, and much more! Whether you are striving for...
Structure Formation in Solution : Ionic Polymers and Colloidal Particles
Structure Formation in Solution : Ionic Polymers and Colloidal Particles
"He found a promising approach in Sogami and Ise’s treatments of ‘electrostatic interactions in macro-ionic solutions’ of spherical  macro-ions (Ise and Sogami, 2005)."

Clays and Clay Minerals, Vol. 54, No. 6, 773-775, 2006

This book is designed to critically review experimental findings on ionic
...
Handbook of Couples Therapy
Handbook of Couples Therapy
The essential guide to successful couples therapy at every stage of the lifecycle

A variety of therapeutic interventions can help couples develop the tools for a successful relationship. Yet many practitioners begin seeing couples without extensive training in couples work. To fill this gap in their therapeutic repertoires, noted couples...

Computational Complexity: A Conceptual Perspective
Computational Complexity: A Conceptual Perspective
This book offers a comprehensive perspective to modern topics in complexity theory, which is a central field of the theoretical foundations of computer science. It addresses the looming question of what can be achieved within a limited amount of time with or without other limited natural computational resources. Can be used as an introduction for...
Affect and Emotion in Human-Computer Interaction: From Theory to Applications (Lecture Notes in Computer Science)
Affect and Emotion in Human-Computer Interaction: From Theory to Applications (Lecture Notes in Computer Science)
Affect and emotion play an important role in our everyday lives: They are present whatever we do, wherever we are, and wherever we go, without us being aware of them for much of the time. When it comes to interaction, be it with humans, technology, or humans via technology, we suddenly become more aware of emotion, either by seeing the...
unlimited object storage image
Result Page: 175 174 173 172 171 170 169 168 167 166 165 164 163 162 161 160 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy