Home | Amazing | Today | Tags | Publishers | Years | Search 
Galaxy Formation and Evolution
Galaxy Formation and Evolution

The rapidly expanding field of galaxy formation lies at the interface between astronomy, particle physics, and cosmology. Covering diverse topics from these disciplines, all of which are needed to understand how galaxies form and evolve, this book is ideal for researchers entering the field. Individual chapters explore the evolution of the...

Game Graphics Programming
Game Graphics Programming

To say that the graphical imagery in video games is very important to the games industry is a bit of an understatement. The graphics in games are so important that they often can make or break a game's success. It is true that all other aspects of a game are important, but the visuals are at times the main selling point along with game...

The Outlaws: A Presidential Agent Novel
The Outlaws: A Presidential Agent Novel

The #1 New York Times-bestselling series returns-and the stakes have never been higher.

Charlie Castillo's secret unit has been disbanded-but that doesn't mean he's out of business. As experience has painfully shown him, there are many things the intelligence community can't do, won't do, or
...

The Complete Book of Locks and Locksmithing (Complete Book of Locks & Locksmithing)
The Complete Book of Locks and Locksmithing (Complete Book of Locks & Locksmithing)

The knowledge, skill, and expertise of any true professional often can be gauged by the library of literature that he or she keeps and has read. In the often mysterious, secretive, and intriguing world of locks and locksmithing, no true professional, aficionado, or curiosity seeker would be without The Complete Book of Locks and Locksmithing,...

Controlled Self-Organisation Using Learning Classifier Systems
Controlled Self-Organisation Using Learning Classifier Systems

The complexity of technical systems increases continuously. Breakdowns and fatal errors occur quite often, respectively. Therefore, the mission of organic computing is to tame these challenges in technical systems by providing appropriate degrees of freedom for self-organised behaviour. Technical systems should adapt to changing requirements...

Evolving Fuzzy Systems - Methodologies, Advanced Concepts and Applications
Evolving Fuzzy Systems - Methodologies, Advanced Concepts and Applications

In today’s real-world applications, there is an increasing demand of integrating new information and knowledge on-demand into model building processes to account for changing system dynamics, new operating conditions, varying human behaviors or environmental influences.

Evolving fuzzy systems (EFS) are a powerful tool...

Group-based Cryptography (Advanced Courses in Mathematics - CRM Barcelona)
Group-based Cryptography (Advanced Courses in Mathematics - CRM Barcelona)

This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, and complexity theory. It is explored how non-commutative (infinite) groups, which are typically studied in combinatorial group theory, can be used in public key cryptography. It is also shown...

Advances in Data Mining and Modeling: Hong Kong 27 - 28 June 2002
Advances in Data Mining and Modeling: Hong Kong 27 - 28 June 2002

Data mining and data modeling are hot topics and are under fast development. Because of its wide applications and rich research contents, a lot of practitioners and academics are attracted to work on these areas. In the view of promoting the communications and collaborations among the practitioners and researchers in Hong Kong, a two-day...

Wavelet Theory and Its Application to Pattern Recognition (Series in Machine Perception and Artificial Intelligence)
Wavelet Theory and Its Application to Pattern Recognition (Series in Machine Perception and Artificial Intelligence)

This 2nd edition is an update of the book "Wavelet Theory and Its Application to Pattern Recognition" published in 2000. Three new chapters, which are research results conducted during 2001-2008, will be added. The book consists of two parts - the first contains the basic theory of wavelet analysis and the second includes...

Cluster Analysis for Data Mining and System Identification
Cluster Analysis for Data Mining and System Identification

Data clustering is a common technique for statistical data analysis, which is used in many fields, including machine learning, data mining, pattern recognition, image analysis and bioinformatics. Clustering is the classification of similar objects into different groups, or more precisely, the partitioning of a data set into subsets...

Syntax-Based Collocation Extraction (Text, Speech and Language Technology)
Syntax-Based Collocation Extraction (Text, Speech and Language Technology)

Syntax-Based Collocation Extraction is the first book to offer a comprehensive, up-to-date review of the theoretical and applied work on word collocations. Backed by solid theoretical results, the computational experiments described based on data in four languages provide support for the book’s basic argument for using syntax-driven...

Design Methodologies for Secure Embedded Systems: Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss
Design Methodologies for Secure Embedded Systems: Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss

This Festschrift is dedicated to Mr. Sorin A. Huss by his friends and his Ph.D. students to honor him duly on the occasion of his 60th birthday.

Mr. Sorin A. Huss was born in Bukarest, Romania on May 21, 1950. He attended a secondary school with emphasis on mathematic and scientific topics in Dachau near Munich and after his Abitur...

Result Page: 895 894 893 892 891 890 889 888 887 886 885 884 883 882 881 880 879 878 877 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy