Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced Graphics Programming Using OpenGL (The Morgan Kaufmann Series in Computer Graphics)
Advanced Graphics Programming Using OpenGL (The Morgan Kaufmann Series in Computer Graphics)
Today truly useful and interactive graphics are available on affordable computers. While hardware progress has been impressive, widespread gains in software expertise have come more slowly. Information about advanced techniquesbeyond those learned in introductory computer graphics textsis not as easy to come by as inexpensive hardware.
...
Data Mining and Knowledge Discovery Approaches Based on Rule Induction Techniques (Massive Computing)
Data Mining and Knowledge Discovery Approaches Based on Rule Induction Techniques (Massive Computing)

This book will give the reader a perspective into the core theory and practice of data mining and knowledge discovery (DM and KD). Its chapters combine many theoretical foundations for various DM and KD methods, and they present a rich array of examples – many of which are drawn from real-life applications. Most of the theoretical...

Security in Ad-hoc and Sensor Networks (Computer and Network Security)
Security in Ad-hoc and Sensor Networks (Computer and Network Security)

Ad hoc and sensor networks continue to have a growing impact on communication. These cost-effective wireless networks provide location independent computing in environments ranging from military battlefields to in-home patient monitoring systems. However, having real-time connectivity to critical information over an open...

Verifying Concurrent Processes Using Temporal Logic (Lecture Notes in Computer Science) (v. 129)
Verifying Concurrent Processes Using Temporal Logic (Lecture Notes in Computer Science) (v. 129)

Concurrent processes can exhibit extremely complicated behavior, and neither informal reasoning nor testing is reliable enough to establish their correctness. In this thesis, we develop a new technique for the verification of parallel programs. The technique is stated in terms of axioms and inference rules, and it is used to prove...

Data Modeling Essentials, Third Edition (Morgan Kaufmann Series in Data Management Systems)
Data Modeling Essentials, Third Edition (Morgan Kaufmann Series in Data Management Systems)
Data Modeling Essentials, Third Edition provides expert tutelage for data modelers, business analysts and systems designers at all levels. Beginning with the basics, this book provides a thorough grounding in theory before guiding the reader through the various stages of applied data modeling and database design. Later chapters address...
Handbook of Applied Algorithms: Solving Scientific, Engineering, and Practical Problems
Handbook of Applied Algorithms: Solving Scientific, Engineering, and Practical Problems

Although vast activity exists, especially recent, the editors did not find any book that treats applied algorithms in a comprehensive manner. The editors discovered a number of graduate courses in computer science programs with titles such as “Design and Analysis of Algorithms, “Combinatorial Algorithms” “Evolutionary...

Developing Web Applications with ASP.NET and C#
Developing Web Applications with ASP.NET and C#
Learn how to create an entire suite of enterprise applications with ASP.NET and C#

ASP.NET is a vast improvement over Microsoft’s popular Web technology, Active Server Pages (ASP). And, when combined with C#, Microsoft’s new and powerful programming language, ASP.NET provides developers with a robust framework for enterprise-level...

Verification Techniques for System-Level Design (Systems on Silicon)
Verification Techniques for System-Level Design (Systems on Silicon)
A must-read in formal and semi-formal verification!

This book will explain how to verify SoC logic designs using formal and semi-formal verification techniques. The critical issue to be addressed is whether the functionality of the design is the one that the designers intended. Simulation has been used for checking the
...
An Introduction to Cyber Modeling and Simulation (Wiley Series in Modeling and Simulation)
An Introduction to Cyber Modeling and Simulation (Wiley Series in Modeling and Simulation)

Introduces readers to the field of cyber modeling and simulation and examines current developments in the US and internationally

This book provides an overview of cyber modeling and simulation (M&S) developments. Using scenarios, courses of action (COAs), and current M&S and simulation environments,...

Advanced Pattern Recognition Technologies with Applications to Biometrics (Premier Reference Source)
Advanced Pattern Recognition Technologies with Applications to Biometrics (Premier Reference Source)
With the increasing concerns on security breaches and transaction fraud, highly reliable and convenient personal verification and identification technologies are more and more requisite in our social activities and national services. Biometrics, used to recognize the identity of an individual, are gaining ever-growing popularity in an extensive...
Biometrics for Network Security
Biometrics for Network Security

The complete guide to implementing biometric security solutions for your network

Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by...

Advances in Design and Specification Languages for Embedded Systems: Selected Contributions from FDL06
Advances in Design and Specification Languages for Embedded Systems: Selected Contributions from FDL06
Embedded systems are meanwhile in the focus of industry in quite different application domains such as automotive, avionics, telecom, and consumer products. The need for a shift in design methodologies towards system level design is widely recognised and design flows aimed to an integration of software and hardware specification and implementation...
unlimited object storage image
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy