Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
Basic Modern Algebra with Applications
Basic Modern Algebra with Applications

The book is primarily intended as a textbook on modern algebra for undergraduate mathematics students. It is also useful for those who are interested in supplementary reading at a higher level. The text is designed in such a way that it encourages independent thinking and motivates students towards further study. The book covers all major...

Mastering Your PhD: Survival and Success in the Doctoral Years and Beyond
Mastering Your PhD: Survival and Success in the Doctoral Years and Beyond

"Mastering Your PhD: Survival and Success in the Doctoral Years and Beyond" helps guide PhD students through their graduate student years. Filled with practical advice on getting started, communicating with your supervisor, staying the course, and planning for the future, this book is a handy guide for graduate students who need...

Agile Processes in Software Engineering and Extreme Programming
Agile Processes in Software Engineering and Extreme Programming

This book contains the refereed proceedings of the 13th International Conference on Agile Software Development, XP 2012, held in Malmö, Sweden, in May 2011. In the last decade, we have seen agile and lean software development strongly influence the way software is developed. Agile and lean software development has moved from being a way...

Analyzing Computer System Performance with Perl::PDQ
Analyzing Computer System Performance with Perl::PDQ

To solve performance problems in modern computing infrastructures, often comprising thousands of servers running hundreds of applications, spanning multiple tiers, you need tools that go beyond mere reporting. You need tools that enable performance analysis of application workflow across the entire enterprise. That's what PDQ (Pretty Damn...

Massively Parallel Evolutionary Computation on GPGPUs (Natural Computing Series)
Massively Parallel Evolutionary Computation on GPGPUs (Natural Computing Series)

Evolutionary algorithms (EAs) are metaheuristics that learn from natural collective behavior and are applied to solve optimization problems in domains such as scheduling, engineering, bioinformatics, and finance. Such applications demand acceptable solutions with high-speed execution using finite computational resources. Therefore, there have...

Data Storage for Social Networks: A Socially Aware Approach (SpringerBriefs in Optimization)
Data Storage for Social Networks: A Socially Aware Approach (SpringerBriefs in Optimization)

Evidenced by the success of Facebook, Twitter, and LinkedIn, online social networks (OSNs) have become ubiquitous, offering novel ways for people to access information and communicate with each other. As the increasing popularity of social networking is undeniable, scalability is an important issue for any OSN that wants to serve a large...

Risk and Portfolio Analysis: Principles and Methods (Springer Series in Operations Research and Financial Engineering)
Risk and Portfolio Analysis: Principles and Methods (Springer Series in Operations Research and Financial Engineering)

Investment and risk management problems are fundamental problems for  financial institutions and involve both speculative and hedging decisions. A structured approach to these problems naturally leads one to the field of applied mathematics in order to translate subjective probability beliefs and attitudes towards risk and reward into...

Spatial Analysis and Modeling in Geographical Transformation Process: GIS-based Applications (GeoJournal Library)
Spatial Analysis and Modeling in Geographical Transformation Process: GIS-based Applications (GeoJournal Library)

Currently, spatial analysis is becoming more important than ever because enormous volumes of spatial data are available from different sources, such as GPS, Remote Sensing, and others.

This book deals with spatial analysis and modelling. It provides a comprehensive discussion of spatial analysis, methods, and approaches related to...

Geometric Methods and Applications: For Computer Science and Engineering (Texts in Applied Mathematics)
Geometric Methods and Applications: For Computer Science and Engineering (Texts in Applied Mathematics)

This book is an introduction to the fundamental concepts and tools needed for solving problems of a geometric nature using a computer. It attempts to fill the gap between standard geometry books, which are primarily theoretical, and applied books on computer graphics, computer vision, robotics, or machine learning.

 This book...

Distributed Multiple Description Coding: Principles, Algorithms and Systems
Distributed Multiple Description Coding: Principles, Algorithms and Systems

This book examines distributed video coding (DVC) and multiple description coding (MDC), two novel techniques designed to address the problems of conventional image and video compression coding. Covering all fundamental concepts and core technologies, the chapters can also be read as independent and self-sufficient, describing each...

The Mathematics of Knots: Theory and Application (Contributions in Mathematical and Computational Sciences)
The Mathematics of Knots: Theory and Application (Contributions in Mathematical and Computational Sciences)

The present volume grew out of the Heidelberg Knot Theory Semester, organized by the editors in winter 2008/09 at Heidelberg University. The contributed papers bring the reader up to date on the currently most actively pursued areas of mathematical knot theory and its applications in mathematical physics and cell biology. Both original...

Security for Wireless Implantable Medical Devices (SpringerBriefs in Computer Science)
Security for Wireless Implantable Medical Devices (SpringerBriefs in Computer Science)

In the treatment of chronic diseases, wireless Implantable Medical Devices (IMDs) are commonly used to communicate with an outside programmer (reader). Such communication raises serious security concerns, such as the ability for hackers to gain access to a patient’s medical records. This brief provides an overview of such attacks and...

Result Page: 290 289 288 287 286 285 284 283 282 281 
©2014 LearnIT (support@pdfchm.net) - Privacy Policy