Home | Amazing | Today | Tags | Publishers | Years | Search 
Automated Technology for Verification and Analysis: 8th International Symposium, ATVA 2010
Automated Technology for Verification and Analysis: 8th International Symposium, ATVA 2010

These proceedings contain the papers presented at the 8th Internationl Symposium on Automated Technology for Verification and Analysis held during September 21–24, 2010 in Singapore. The primary objective of the ATVA conferences remains the same: to exchange and promote the latest advances of state-of-the-art research on...

Automata, Languages and Programming: 38th International Colloquium, ICALP 2011, Zurich, Switzerland
Automata, Languages and Programming: 38th International Colloquium, ICALP 2011, Zurich, Switzerland

ICALP 2011, the 38th edition of the International Colloquium on Automata, Languages and Programming, was held in Z¨urich, Switzerland, during July 4–8, 2011. ICALP is a series of annual conferences of the European Association for Theoretical Computer Science (EATCS) which first took place in 1972. This year, the ICALP...

Document Security: Protecting Physical and Electronic Content
Document Security: Protecting Physical and Electronic Content

Several electronic layers exist in most documents, a fact overlooked by many writers. Probing these sublayers often reveals information not intended for release by the author. Documents in electronic formats create a “palimpsest” that even semiskilled investigators can probe for sensitive data.

Palimpsest seems...

Markov Models for Pattern Recognition: From Theory to Applications
Markov Models for Pattern Recognition: From Theory to Applications

The development of pattern recognition methods on the basis of so-called Markov models is tightly coupled to the technological progress in the field of automatic speech recognition. Today, however, Markov chain and hidden Markov models are also applied in many other fields where the task is the modeling and analysis of chronologically...

England For Dummies
England For Dummies

England offers so many royal palaces, massive cathedrals, glorious gardens, world-class museums, and historical sites that you could be overwhelmed, but this guide helps you zero in on the things you want to see and do and plan the perfect trip for you! It gives you up-to-date info on: shopping and antiquing; side trips to attractions; where...

Encyclopedia of Molecular Mechanisms of Disease
Encyclopedia of Molecular Mechanisms of Disease

This comprehensive encyclopedia supplies the reader with concise information on the molecular pathophysiology of disease. Entries include defined diseases (such as Parkinson's disease) as well as pathophysiological entities (such as tremor). The 1,200 essays are brilliantly structured to allow rapid retrieval of the desired information....

AI 2010: Advances in Artificial Intelligence: 23rd Australasian Joint Conference, Adelaide, Australia, December 7-10, 2010. Proceedings
AI 2010: Advances in Artificial Intelligence: 23rd Australasian Joint Conference, Adelaide, Australia, December 7-10, 2010. Proceedings

This volume contains papers presented at AI 2010, the 23rd Australasian Joint Conference on Artificial Intelligence held December 7–10, 2010 in Adelaide, South Australia. The Australasian Joint Conference on Artificial Intelligence has a long history and has established itself as the premier event for artificial intelligence researchers...

The Investigator's Guide to Computer Crime
The Investigator's Guide to Computer Crime

In the past half-century we have gone from a world where computers were science fiction to a world where computers are everyday fact. Just thirty years ago the computer that flew with the first astronauts to the moon had less computing power than the computer on the average student’s desk today. Computers have grown in popularity,...

The Traveling Salesman: Computational Solutions for TSP Applications (Lecture Notes in Computer Science)
The Traveling Salesman: Computational Solutions for TSP Applications (Lecture Notes in Computer Science)

More than fifteen years ago, I was faced with the following problem in an assignment for a class in computer science. A brewery had to deliver beer to five stores, and the task was to write a computer program for determining the shortest route for the truck driver to visit all stores and return to the brewery. All my attemps to find a...

Securing the Smart Grid: Next Generation Power Grid Security
Securing the Smart Grid: Next Generation Power Grid Security

"The first step in securing the Smart Grid is to fully understand the threat landscape. This book provides both a timely and relevant overview of the subject - a must-read for anyone responsible for securing the grid as well as consumers looking to implement the technology!."-- Dr. Patrick Engebretson, Assistant Professor of...

Into the Networked Age: How IBM and Other Firms are Getting There Now
Into the Networked Age: How IBM and Other Firms are Getting There Now

In this dynamic book, based on the most effective strategies of IBM and other market leaders, managers will learn to successfully transform their organizations into a business prepared to compete in a networked age.

Mainframes, client servers, PCs, networks, e-business, the Internet, databases, technical management--indeed, in the...

Principles and Practice of Constraint Programming - CP 2006: 12th International Conference
Principles and Practice of Constraint Programming - CP 2006: 12th International Conference

The 12th International Conference on the Principles and Practice of Constraint Programming (CP 2006) was held in Nantes, France, September 24–29, 2006. Information about the conference can be found on theWeb at http://www.sciences. univ-nantes.fr/cp06/. Information about past conferences in the series can be found at...

Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy