Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Neural Simulation Language: A System for Brain Modeling
The Neural Simulation Language: A System for Brain Modeling
The Neural Simulation Language (NSL), developed by Alfredo Weitzenfeld, Michael Arbib, and Amanda Alexander, provides a simulation environment for modular brain modeling. NSL is an object-oriented language offering object-oriented protocols applicable to all levels of neural simulation. One of NSL's main strengths is that it allows for realistic...
The Mathematical Foundation of Informatics
The Mathematical Foundation of Informatics
The first international conference organized in Vietnam, which concerns theoretical computer science, was the ICOMIDC Symposium on Mathematics of Computation, held in Ho Chi Minh City in 1988. For the last years great developments have been made in this areas. Therefore, it had become necessary to organize in Vietnam another international...
Genetic Fuzzy Systems
Genetic Fuzzy Systems

In recent years, a great number of publications have explored the use of genetic algorithms as a tool for designing fuzzy systems. Genetic Fuzzy Systems explores and discusses this symbiosis of evolutionary computation and fuzzy logic. The book summarizes and analyzes the novel field of genetic fuzzy systems, paying special attention to...

Check Point Next Generation Security Administration
Check Point Next Generation Security Administration
Check Point NG aims to teach its readers how to install and set up VPN-1/FireWall-1 Next Generation, the latest version of the highly respected firewall software from Check Point. Its authors--all with significant network and security certifications--accomplish their objective: it seems likely that this book will travel with a lot of Check...
Use Case Modeling
Use Case Modeling
Developers who effectively employ use cases deliver better applications--on time and under budget. The concept behind use cases is perhaps as old as software itself; they express the behavior of systems in terms of how users will ultimately interact with them. Despite this inherent simplicity, the use case approach is frequently misapplied,...
Public Key Infrastructure and Implementation and Design
Public Key Infrastructure and Implementation and Design
Today we are in the midst of an electronic business revolution. The growth of the Internet and e−commerce has presented businesses with an opportunity to forge new links with customers and partners by transcending borders and removing geographical barriers. Electronic information exchange and networking poses a greater threat than ever before...
Introduction to Cryptography
Introduction to Cryptography

Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data.

In the first part, this book covers the key concepts of cryptography on...

Integrating Service Level Agreements: Optimizing Your OSS for SLA Delivery
Integrating Service Level Agreements: Optimizing Your OSS for SLA Delivery
Uncover a revolutionary approach to SLAs that will help you gain a competitive advantage in the field

The use of Service Level Agreements (SLAs) will soon become the prevailing business model for delivering a large number of products and services. SLAs offer service providers the ability to distinguish themselves from the competition in...

Design Methods for Reactive Systems: Yourdon, Statemate, and the UML
Design Methods for Reactive Systems: Yourdon, Statemate, and the UML
Design Methods for Reactive Systems describes methods and techniques for the design of software systemsparticularly reactive software systems that engage in stimulus-response behavior. Such systems, which include information systems, workflow management systems, systems for e-commerce, production control systems, and embedded...
Software Defined Radio: Enabling Technologies
Software Defined Radio: Enabling Technologies
Software defined radio (SDR) is one of the most important topics of research, and indeed development, in the area of mobile and personal communications. SDR is viewed as an enabler of global roaming and as a unique platform for the rapid introduction of new services into existing live networks. It therefore promises mobile communication networks a...
Hacker's Delight
Hacker's Delight

This is a collection of small programming tricks that I have come across over many years. Most of them will work only on computers that represent integers in two's-complement form. Although a 32-bit machine is assumed when the register length is relevant, most of the tricks are easily adapted to machines with other register...

Digraphs: Theory, Algorithms and Applications
Digraphs: Theory, Algorithms and Applications
The study of directed graphs has developed enormously over recent decades, yet no book covers more than a tiny fraction of the results from more than 3000 research articles on the topic. Digraphs is the first book to present a unified and comprehensive survey of the subject. In addition to covering the theoretical aspects,...
unlimited object storage image
Result Page: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy