|
|
|
Pocket Data Mining: Big Data on Small Devices (Studies in Big Data)
Owing to continuous advances in the computational power of handheld devices like smartphones and tablet computers, it has become possible to perform Big Data operations including modern data mining processes onboard these small devices. A decade of research has proved the feasibility of what has been termed as Mobile Data... | | Physical Security Strategy and Process Playbook
The Physical Security Strategy and Process Playbook is a concise yet comprehensive treatment of physical security management in the business context. It can be used as an educational tool, help a security manager define security requirements, and serve as a reference for future planning.
This book is organized into six... | | Numerical Analysis in Electromagnetics: The TLM Method (ISTE)
The aim of this book is to give a broad overview of the TLM (Transmission Line Matrix) method, which is one of the “time-domain numerical methods”. These methods are reputed for their significant reliance on computer resources. However, they have the advantage of being highly general.
The TLM method has acquired a... |
|
|
|
Result Page: 147 146 145 144 143 142 141 140 139 138 137 136 135 134 133 132 131 130 129 |