Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
Fault Analysis in Cryptography (Information Security and Cryptography)
Fault Analysis in Cryptography (Information Security and Cryptography)

In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Research into the effect of cosmic rays on semiconductors, an area of particular interest in the aerospace industry, led to methods of hardening electronic...

Numerical and Symbolic Scientific Computing: Progress and Prospects (Texts & Monographs in Symbolic Computation)
Numerical and Symbolic Scientific Computing: Progress and Prospects (Texts & Monographs in Symbolic Computation)

The book presents the state of the art and results and also includes articles pointing to future developments. Most of the articles center around the theme of linear partial differential equations. Major aspects are fast solvers in elastoplasticity, symbolic analysis for boundary problems, symbolic treatment of operators, computer algebra,...

Selective Estrogen Receptor Modulators: A New Brand of Multitarget Drugs
Selective Estrogen Receptor Modulators: A New Brand of Multitarget Drugs
The increasing awareness on the varied consequences of hypogonadism in distinct organs and systems has supported the notion of estrogens as systemic agents. This observation is congruent with the variety of tissues affected by estrogens when used in hormone therapy formulations on hypogonadic women. Apart from the genital tract...
The Integrated Architecture Framework Explained: Why, What, How
The Integrated Architecture Framework Explained: Why, What, How

This book captures and communicates the wealth of architecture experience Capgemini has gathered as a member of The Open Group – a vendor- and technology-neutral consortium formed by major industry players – in developing, deploying, and using its “Integrated Architecture Framework” (IAF) since its origination in 1993....

Performance Analysis and Optimization of Multi-Traffic on Communication Networks
Performance Analysis and Optimization of Multi-Traffic on Communication Networks

Promptly growing demand for telecommunication services and information interchange has led to the fact that communication became one of the most dynamical branches of an infrastructure of a modern society. The book introduces to the bases of classical MDP theory; problems of a finding optimal САС in models are investigated and...

Grouping Multidimensional Data: Recent Advances in Clustering
Grouping Multidimensional Data: Recent Advances in Clustering
Clustering is a fundamental problem that has numerous applications in many disciplines. Clustering techniques are used to discover natural groups in datasets and to identify abstract structures that might reside there, without having any background knowledge of the characteristics of the data. They have been used in various areas including...
Bioinformatics: Tools and Applications
Bioinformatics: Tools and Applications
Biology has progressed tremendously in the last decade due in part to the increased automation in the generation of data from sequences to genotypes to phenotypes. Biology is now very much an information science, and bioinformatics provides the means to connect biological data to hypotheses. Within this volume, we have collated...
Symmetric Cryptographic Protocols
Symmetric Cryptographic Protocols

This book focuses on protocols and constructions that make good use of the building blocks for symmetric cryptography. The book brings under one roof, several esoteric strategies of utilizing symmetric cryptographic blocks. The specific topics addressed by the book include various key distribution strategies for unicast, broadcast and...

Modern Cryptography Primer: Theoretical Foundations and Practical Applications
Modern Cryptography Primer: Theoretical Foundations and Practical Applications

Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these...

Data Fusion: Concepts and Ideas
Data Fusion: Concepts and Ideas

This textbook provides a comprehensive introduction to the concepts and idea of multisensor data fusion.
It is an extensively revised second edition of the author's successful book: "Multi-Sensor Data Fusion:
An Introduction" which was originally published by Springer-Verlag in 2007.
The main changes in
...

Guide to Programming and Algorithms Using R
Guide to Programming and Algorithms Using R

This easy-to-follow textbook provides a student-friendly introduction to programming and algorithms. Emphasis is placed on the threshold concepts that present barriers to learning, including the questions that students are often too embarrassed to ask. The book promotes an active learning style in which a deeper understanding is gained from...

Human Recognition at a Distance in Video (Advances in Pattern Recognition)
Human Recognition at a Distance in Video (Advances in Pattern Recognition)

Most biometric systems employed for human recognition require physical contact with, or close proximity to, a cooperative subject. Far more challenging is the ability to reliably recognize individuals at a distance, when viewed from an arbitrary angle under real-world environmental conditions. Gait and face data are the two biometrics that...

Result Page: 307 306 305 304 303 302 301 300 299 298 
©2015 LearnIT (support@pdfchm.net) - Privacy Policy