Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Programming Bitcoin: Learn How to Program Bitcoin from Scratch
Programming Bitcoin: Learn How to Program Bitcoin from Scratch

Dive into Bitcoin technology with this hands-on guide from one of the leading teachers on Bitcoin and Bitcoin programming. Author Jimmy Song shows Python programmers and developers how to program a Bitcoin library from scratch. You’ll learn how to work with the basics, including the math, blocks, network, and...

Ethereum Projects for Beginners: Build blockchain-based cryptocurrencies, smart contracts, and DApps
Ethereum Projects for Beginners: Build blockchain-based cryptocurrencies, smart contracts, and DApps

Understand the Ethereum platform to build distributed applications that are secured and decentralized using blockchain technology

Key Features

  • Build your own decentralized applications using real-world blockchain examples
  • Implement Ethereum for building smart contracts and...
Fundamentals of Probability and Statistics for Engineers
Fundamentals of Probability and Statistics for Engineers
This book was written for an introductory one-semester or two-quarter course in probability and statistics for students in engineering and applied sciences. No previous knowledge of probability or statistics is presumed but a good understanding of calculus is a prerequisite for the material.

The development of this book was guided by a
...
Formal Verification of Floating-Point Hardware Design
Formal Verification of Floating-Point Hardware Design

This is the first book to focus on the problem of ensuring the correctness of floating-point hardware designs through mathematical methods.  Formal Verification of Floating-Point Hardware Design advances a verification methodology based on a unified theory of register-transfer logic and floating-point arithmetic that has...

Biometric Image Discrimination Technologies (Computational Intelligence and Its Applications Series)
Biometric Image Discrimination Technologies (Computational Intelligence and Its Applications Series)
Personal identification and verification both play a critical role in our society.
Today, more and more business activities and work practices are computerized. Ecommerce
applications, such as e-banking, or security applications, such as building
access, demand fast, real-time and accurate personal identification. Traditional
...
Machine Vision : Theory, Algorithms, Practicalities
Machine Vision : Theory, Algorithms, Practicalities
In the last 40 years, machine vision has evolved into a mature field embracing a wide range of applications including surveillance, automated inspection, robot assembly, vehicle guidance, traffic monitoring and control, signature verification, biometric measurement, and analysis of remotely sensed images. While researchers and industry specialists...
Quantum Circuit Simulation
Quantum Circuit Simulation

Quantum Circuit Simulation covers the fundamentals of linear algebra and introduces basic concepts of quantum physics needed to understand quantum circuits and algorithms. It requires only basic familiarity with algebra, graph algorithms and computer engineering. After introducing necessary background, the authors describe key simulation...

Pattern Recognition Technologies and Applications: Recent Advances (Premier Reference Source)
Pattern Recognition Technologies and Applications: Recent Advances (Premier Reference Source)
The nature of handwriting in our society has significantly altered over the ages due to the introduction of new technologies such as computers and the World Wide Web. With increases in the amount of signature verification needs, state of the art internet and paper-based automated recognition methods are necessary.

Pattern Recognition...

Essential Issues in SOC Design: Designing Complex Systems-on-Chip
Essential Issues in SOC Design: Designing Complex Systems-on-Chip

This book originated from a workshop held at the DATE 2005 conference, namely Designing Complex SOCs. State-of-the-art in issues related to System-on-Chip (SoC) design by leading experts in the fields, covers IP development, verification, integration, chip implementation, testing and software.

SOC design is fast becoming the key...

Ultra-Wideband Communications: Fundamentals and Applications (Communications Engineering and Emerging Technologies)
Ultra-Wideband Communications: Fundamentals and Applications (Communications Engineering and Emerging Technologies)

Ultra-wideband (UWB) radios are expected to play a revolutionary role in the future of wireless communications systems. The great interest in UWB communications was sparked by FCC rulings in February 2002 that authorized the unlicensed commercial deployment of UWB technology under a strict power control in 7500 MHz of spectrum. This...

Principles of Model Checking
Principles of Model Checking
Our growing dependence on increasingly complex computer and software systems necessitates the development of formalisms, techniques, and tools for assessing functional properties of these systems. One such technique that has emerged in the last twenty years is model checking, which systematically (and automatically) checks whether a model of a...
Design Methods and Applications for Distributed Embedded Systems
Design Methods and Applications for Distributed Embedded Systems

The ever decreasing price/performance ratio of microcontrollers makes it economically attractive to replace more and more conventional mechanical or electronic control systems within many products by embedded real-time computer systems. An embedded real-time computer system is always part of a well-specified larger system, which we call an...

unlimited object storage image
Result Page: 28 27 26 25 24 23 22 21 20 19 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy