Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Foundations of Statistical Algorithms: With References to R Packages (Chapman & Hall/CRC Computer Science and Data Analysis)
Foundations of Statistical Algorithms: With References to R Packages (Chapman & Hall/CRC Computer Science and Data Analysis)

A new and refreshingly different approach to presenting the foundations of statistical algorithms, Foundations of Statistical Algorithms: With References to R Packages reviews the historical development of basic algorithms to illuminate the evolution of today’s more powerful statistical...

Tools and Algorithms for the Construction and Analysis of Systems (Lecture Notes in Computer Science)
Tools and Algorithms for the Construction and Analysis of Systems (Lecture Notes in Computer Science)
ETAPS 2007 is the tenth instance of the European Joint Conferences on Theory and Practice of Software, and thus a cause for celebration.

The events that comprise ETAPS address various aspects of the system development process, including specification, design, implementation, analysis and
...
Mathematical and Engineering Methods in Computer Science: 8th International Doctoral Workshop, MEMICS 2012, Znojmo, Czech Republic, October 25-28, ... Papers (Lecture Notes in Computer Science)
Mathematical and Engineering Methods in Computer Science: 8th International Doctoral Workshop, MEMICS 2012, Znojmo, Czech Republic, October 25-28, ... Papers (Lecture Notes in Computer Science)
This volume contains the post-proceedings of the 8th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science, MEMICS 2012, held in Znojmo, Czech Republic, in October, 2012. The 13 thoroughly revised papers were carefully selected out of 31 submissions and are presented together with 6 invited papers. The topics covered by...
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
Generative Adversarial Networks Projects: Build next-generation generative models using TensorFlow and Keras
Generative Adversarial Networks Projects: Build next-generation generative models using TensorFlow and Keras

Explore various Generative Adversarial Network architectures using the Python ecosystem

Key Features

  • Use different datasets to build advanced projects in the Generative Adversarial Network domain
  • Implement projects ranging from generating 3D shapes to a face aging...
Ethereum Projects for Beginners: Build blockchain-based cryptocurrencies, smart contracts, and DApps
Ethereum Projects for Beginners: Build blockchain-based cryptocurrencies, smart contracts, and DApps

Understand the Ethereum platform to build distributed applications that are secured and decentralized using blockchain technology

Key Features

  • Build your own decentralized applications using real-world blockchain examples
  • Implement Ethereum for building smart contracts and...
Proof and Disproof in Formal Logic: An Introduction for Programmers (Oxford Texts in Logic)
Proof and Disproof in Formal Logic: An Introduction for Programmers (Oxford Texts in Logic)
Proof and Disproof in Formal Logic is a lively and entertaining introduction to formal logic providing an excellent insight into how a simple logic works. Formal logic allows you to check a logical claim without considering what the claim means. This highly abstracted idea is an essential and practical part of computer science. The idea of a...
Effective Functional Verification: Principles and Processes
Effective Functional Verification: Principles and Processes
Effective Functional Verification is organized into 4 parts. The first part contains 3 chapters designed appeal to newcomers and experienced people to the field. There is a survey of various verification methodologies and a discussion of them.

The second part with 3 chapters is targeted towards people in management and...

Software Testing: Concepts and Operations (Quantitative Software Engineering Series)
Software Testing: Concepts and Operations (Quantitative Software Engineering Series)

Explores and identifies the main issues, concepts, principles and evolution of software testing, including software quality engineering and testing concepts, test data generation, test deployment analysis, and software test management

This book examines the principles, concepts, and processes that are fundamental to
...

Pattern Recognition Technologies and Applications: Recent Advances (Premier Reference Source)
Pattern Recognition Technologies and Applications: Recent Advances (Premier Reference Source)
The nature of handwriting in our society has significantly altered over the ages due to the introduction of new technologies such as computers and the World Wide Web. With increases in the amount of signature verification needs, state of the art internet and paper-based automated recognition methods are necessary.

Pattern Recognition...

Essential Issues in SOC Design: Designing Complex Systems-on-Chip
Essential Issues in SOC Design: Designing Complex Systems-on-Chip

This book originated from a workshop held at the DATE 2005 conference, namely Designing Complex SOCs. State-of-the-art in issues related to System-on-Chip (SoC) design by leading experts in the fields, covers IP development, verification, integration, chip implementation, testing and software.

SOC design is fast becoming the key...

Ultra-Wideband Communications: Fundamentals and Applications (Communications Engineering and Emerging Technologies)
Ultra-Wideband Communications: Fundamentals and Applications (Communications Engineering and Emerging Technologies)

Ultra-wideband (UWB) radios are expected to play a revolutionary role in the future of wireless communications systems. The great interest in UWB communications was sparked by FCC rulings in February 2002 that authorized the unlicensed commercial deployment of UWB technology under a strict power control in 7500 MHz of spectrum. This...

Result Page: 27 26 25 24 23 22 21 20 19 18 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy