 |
|
|
|
 The Neural Simulation Language: A System for Brain ModelingThe Neural Simulation Language (NSL), developed by Alfredo Weitzenfeld, Michael Arbib, and Amanda Alexander, provides a simulation environment for modular brain modeling. NSL is an object-oriented language offering object-oriented protocols applicable to all levels of neural simulation. One of NSL's main strengths is that it allows for realistic... |  |  The Mathematical Foundation of InformaticsThe first international conference organized in Vietnam, which concerns theoretical computer science, was the ICOMIDC Symposium on Mathematics of Computation, held in Ho Chi Minh City in 1988. For the last years great developments have been made in this areas. Therefore, it had become necessary to organize in Vietnam another international... |  |  Genetic Fuzzy Systems
In recent years, a great number of publications have explored the use of genetic algorithms as a tool for designing fuzzy systems. Genetic Fuzzy Systems explores and discusses this symbiosis of evolutionary computation and fuzzy logic. The book summarizes and analyzes the novel field of genetic fuzzy systems, paying special attention to... |
|
 Check Point Next Generation Security AdministrationCheck Point NG aims to teach its readers how to install and set up VPN-1/FireWall-1 Next Generation, the latest version of the highly respected firewall software from Check Point. Its authors--all with significant network and security certifications--accomplish their objective: it seems likely that this book will travel with a lot of Check... |  |  Use Case ModelingDevelopers who effectively employ use cases deliver better applications--on time and under budget. The concept behind use cases is perhaps as old as software itself; they express the behavior of systems in terms of how users will ultimately interact with them. Despite this inherent simplicity, the use case approach is frequently misapplied,... |  |  Public Key Infrastructure and Implementation and DesignToday we are in the midst of an electronic business revolution. The growth of the Internet and e−commerce has presented businesses with an opportunity to forge new links with customers and partners by transcending borders and removing geographical barriers. Electronic information exchange and networking poses a greater threat than ever before... |
|
 Introduction to CryptographyDue to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data.
In the first part, this book covers the key concepts of cryptography on... |  |  Integrating Service Level Agreements: Optimizing Your OSS for SLA DeliveryUncover a revolutionary approach to SLAs that will help you gain a competitive advantage in the field
The use of Service Level Agreements (SLAs) will soon become the prevailing business model for delivering a large number of products and services. SLAs offer service providers the ability to distinguish themselves from the competition in... |  |  Design Methods for Reactive Systems: Yourdon, Statemate, and the UMLDesign Methods for Reactive Systems describes methods and techniques for the design of software systemsparticularly reactive software systems that engage in stimulus-response behavior. Such systems, which include information systems, workflow management systems, systems for e-commerce, production control systems, and embedded... |
|
|
|
Result Page: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next |