|
|
|
|
| | Bayesian Networks and Influence Diagrams: A Guide to Construction and Analysis (Information Science and Statistics)Probabilistic networks, also known as Bayesian networks and influence diagrams, have become one of the most promising technologies in the area of applied artificial intelligence, offering intuitive, efficient, and reliable methods for diagnosis, prediction, decision making, classification, troubleshooting, and data mining under uncertainty.... | | Integrated Formal Methods: 4th International Conference, IFM 2004, CanterburyThe fourth conference in the series of international meetings on Integrated Formal Methods, IFM, was held in Canterbury, UK, 4–7 April 2004. The conference was organized by the Computing Laboratory at the University of Kent, whose main campus is just outside the ancient town of Canterbury, part of the county of Kent.
Kent is... |
|
Design of Hashing Algorithms (Lecture Notes in Computer Science)
Historically, computer security is related to both cryptography and access
control in operating systems. Cryptography, although mostly applied in
the military and diplomacy, was used to protect communication channels
and storage facilities (especially the backups). In the seventies there was a
breakthrough in cryptography - the... | | Software Reliability Methods (Texts in Computer Science)
This book presents current methods for dealing with software reliability, illustrating the advantages and disadvantages of each method. The description of the techniques is intended for a non-expert audience with some minimal technical background. It also describes some advanced techniques, aimed at researchers and practitioners in software... | | Software Verification and Analysis: An Integrated, Hands-On ApproachThis book addresses the most important techniques in improving the correctness of software, including correctness by construction (top-down refinement), program proving, static analysis and dynamic, execution-based analysis (testing and debugging).
Three major software verification techniques are discussed: Semantic program synthesis and... |
|
| | Cryptographic Security Architecture: Design and VerificationThis book describes various aspects of cryptographic security architecture design, with a particular emphasis on the use of rigorous security models and practices in the design. The first portion of the book presents the overall architectural basis for the design, providing a general overview of features such as the object model and... | | |
|
HVAC FundamentalsHVAC Fundamentals covers the full range of HVAC systems used in today’s facilities. This is a comprehensive book providing the reader a detailed description of how HVAC systems operate. The HVAC systems are divided into components and controls for air, water, heating, ventilating and air conditioning to clearly illustrate the way in which... | | Embedded Systems Handbook (Industrial Information Technology)The purpose of the Embedded Systems Handbook is to provide a reference useful to a broad range of professionals and researchers from industry and academia involved in the evolution of concepts and technologies, as well as development and use of embedded systems and related technologies.
The book provides a comprehensive overview of the... | | |
|
|
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 |