Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Invitation to Number Theory (New Mathematical Library)
Invitation to Number Theory (New Mathematical Library)
This book is one of a series written by professional mathematicians in order to make some important mathematical ideas interesting and understandable to a large audience of high school students and laymen. Most of the volumes in the New Mathematical Library cover topics not usually included in the high school curriculum; they vary in difficulty,...
What is Death?: A Scientist Looks at the Cycle of Life
What is Death?: A Scientist Looks at the Cycle of Life
what is death?

A Scientist Looks at the Cycle of Life

Answering the question "What is death?" by focusing on the individual is blinkered. It restricts attention to a narrow zone around the individual body of a creature. Instead, how expansive is the answer we receive when we look at the context of death within the...

The PC Doctor's Fix It Yourself Guide
The PC Doctor's Fix It Yourself Guide
If you are reading this, you probably have a computer. If I’m right and you do, then there’s a very good chance that it’s important to you, either personally or professionally, or both. Another thing I can safely assume is that you probably know what it feels like when your computer goes wrong.

Computers are all around
...
Performance Analysis and Optimization of Multi-Traffic on Communication Networks
Performance Analysis and Optimization of Multi-Traffic on Communication Networks

Promptly growing demand for telecommunication services and information interchange has led to the fact that communication became one of the most dynamical branches of an infrastructure of a modern society. The book introduces to the bases of classical MDP theory; problems of a finding optimal САС in models are investigated and...

The Art of XSD - SQL Server XML schemas
The Art of XSD - SQL Server XML schemas

When information is exchanged in XML format, there needs to be an agreement between the sender and receiver about the structure and content of the XML document. An XSD (XML Schema Definition Language) Schema can be used to enforce this contract and validate the XML data being exchanged and, given that a lot of applications exchange...

Link Mining: Models, Algorithms, and Applications
Link Mining: Models, Algorithms, and Applications

This book presents in-depth surveys and systematic discussions on models, algorithms and applications for link mining. Link mining is an important field of data mining. Traditional data mining focuses on "flat" data in which each data object is represented as a fixed-length attribute vector. However, many real-world data sets are...

The Art of Computer Programming, Volume 4A: Combinatorial Algorithms, Part 1
The Art of Computer Programming, Volume 4A: Combinatorial Algorithms, Part 1

The TITLE of Volume 4 is Combinatorial Algorithms, and when I proposed it I was strongly inclined to add a subtitle: The Kind of Programming I Like Best. Mv editors have decided to tone down such exuberance, but the fact remains that programs with a combinatorial flavor have always been my favorites.

On the other hand I've...

Computer Aided and Integrated Manufacturing Systems, Volume 4: Computer Aided Design / Computer Aided Manufacturing
Computer Aided and Integrated Manufacturing Systems, Volume 4: Computer Aided Design / Computer Aided Manufacturing

This 5 volume MRW (Major Reference Work) is entitled "Computer Aided and Integrated Manufacturing Systems". A brief summary description of each of the 5 volumes will be noted in their respective PREFACES. An MRW is normally on a broad subject of major importance on the international scene. Because of the breadth of a major...

C# Programming: From Problem Analysis to Program Design
C# Programming: From Problem Analysis to Program Design

C# Programming: From Problem Analysis to Program Design requires no previous introduction to programming and only a mathematical background of high school algebra. The book uses C# as the programming language for software development; however, the basic programming concepts presented can be applied to a number of other languages....

Penetration Tester's Open Source Toolkit, Third Edition
Penetration Tester's Open Source Toolkit, Third Edition

Penetration testing is often considered an art as much as it is a science, but even an artist needs the right brushes to do the job well. Many commercial and open source tools exist for performing penetration testing, but it’s often hard to ensure that you know what tools are available and which ones to use for a certain task....

Nuke 101: Professional Compositing and Visual Effects
Nuke 101: Professional Compositing and Visual Effects

The Foundry’s Nuke is fast becoming the industry leader in compositing software for film and TV. Virtually all the leading visual effects studios—ILM, Digital Domain, Weta Digital, MPC, Framestore, The Mill, and Sony Pictures Imageworks—now use Nuke as their main compositing tool. This is not surprising, as Nuke offers...

Electric Power Transformer Engineering, Second Edition
Electric Power Transformer Engineering, Second Edition

It is appropriate that I first acknowledge my appreciation to Professor Leo Grigsby for inviting me to prepare the chapter on power transformers for the first edition (2001) of his now very popular Electric Power Engineering Handbook. From this evolved the recognition that two chapters from the 2001 Handbook, those for (1) substations...

unlimited object storage image
Result Page: 880 879 878 877 876 875 874 873 872 871 870 869 868 867 866 865 864 863 862 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy