Home | Amazing | Today | Tags | Publishers | Years | Search 
Information Theory and Statistics: A Tutorial
Information Theory and Statistics: A Tutorial
Information Theory and Statistics: A Tutorial is concerned with applications of information theory concepts in statistics, in the finite alphabet setting. The topics covered include large deviations, hypothesis testing, maximum likelihood estimation in exponential families, analysis of contingency tables, and iterative algorithms with an...
Data Streams: Algorithms and Applications (Foundations and Trends in Theoretical Computer Science)
Data Streams: Algorithms and Applications (Foundations and Trends in Theoretical Computer Science)
Data stream algorithms as an active research agenda emerged only over the past few years, even though the concept of making few passes over the data for performing computations has been around since the early days of Automata Theory. The data stream agenda now pervades many branches of Computer Science including databases, networking, knowledge...
Pairwise Independence and Derandomization (Foundations and Trends(R) in Theoretical Computer Science)
Pairwise Independence and Derandomization (Foundations and Trends(R) in Theoretical Computer Science)
This article gives several applications of the following paradigm, which has proven extremely powerful in algorithm design and computational complexity. First, design a probabilistic algorithm for a given problem. Then, show that the correctness analysis of the algorithm remains valid even when the random strings used by the algorithm do not come...
Network Coding Theory (Foundations and Trends(R) in Communications and Information Theory)
Network Coding Theory (Foundations and Trends(R) in Communications and Information Theory)
Network Coding Theory provides a tutorial on the basic of network coding theory. It presents the material in a transparent manner without unnecessarily presenting all the results in their full generality. Store-and-forward had been the predominant technique for transmitting information through a network until its optimality was refuted by network...
Resource Allocation and Cross Layer Control in Wireless Networks
Resource Allocation and Cross Layer Control in Wireless Networks
Resource Allocation and Cross Layer Control in Wireless Networks presents abstract models that capture the cross layer interaction from the physical to transport layer in wireless network architectures including cellular, ad-hoc and sensor networks as well as hybrid wireless-wireline. The emphasis in the presentation is on describing the models and...
Computational Studies of Human Motion: Part 1, Tracking and Motion Synthesis
Computational Studies of Human Motion: Part 1, Tracking and Motion Synthesis
Computational Studies of Human Motion: Part 1, Tracking and Motion Synthesis reviews methods for kinematic tracking of the human body in video. The review confines itself to the earlier stages of motion, focusing on tracking and motion synthesis. There is an extensive discussion of open issues. The authors identify some puzzling phenomena...
QoS-Based Resource Allocation and Transceiver Optimization (Foundations and Trends(R) in Communications and Information Theory)
QoS-Based Resource Allocation and Transceiver Optimization (Foundations and Trends(R) in Communications and Information Theory)
QoS-Based Resource Allocation and Transceiver Optimization derives a comprehensive theoretical framework for SIR balancing, with and without noise. The theory considers the possible use of receive strategies (e.g. interference filtering or channel assignment), which can be included in the model in an abstract way. Power allocation and receiver...
Average-Case Complexity (Foundations and Trends(R) in Theoretical Computer Science)
Average-Case Complexity (Foundations and Trends(R) in Theoretical Computer Science)
Average-Case Complexity is a thorough survey of the average-case complexity of problems in NP. The study of the average-case complexity of intractable problems began in the 1970s, motivated by two distinct applications: the developments of the foundations of cryptography and the search for methods to "cope" with the intractability of...
Paint or Pixel: The Digital Divide in Illustration Art
Paint or Pixel: The Digital Divide in Illustration Art
This collection of art and essays, by the best of todays science fiction and fantasy artists, presents candid opinions behind the revolution now taking place in the field. Are computers creating a seismic shift in the creation of sfandf art, or are they just another tool in the artists paint box?

I was there the day the commercial art
...
Degunking Linux
Degunking Linux
Linux has grown in popularity and is increasingly being adopted by home users and others who laud this nearly un-crashable, free operating system. But setting up a Linux OS can be tricky and time consuming. And managing a Linux system can be even more difficult if you don't have the right knowledge. Degunking Linux expertly shows readers...
CISA Review Manual 2008
CISA Review Manual 2008
The CISA Review Manual 2008 has been completely revised and updated with new content to reflect changing industry principles and practices, and is organized according to the current CISA job practice areas. The manual features detailed descriptions of the tasks performed by IS auditors and the knowledge required to plan, manage and perform IS...
Bomb the Suburbs: Graffiti, Race, Freight-Hopping and the Search for Hip-Hop's Moral Center
Bomb the Suburbs: Graffiti, Race, Freight-Hopping and the Search for Hip-Hop's Moral Center
Should graffiti writers organize to tear up the cities, or should they really be bombing the ‘burbs? That’s the question posed by William Upski Wimsatt in his seminal foray into the world of hip-hop, rap, and street art, and the culture and politics that surround it. But to say that the book deals only with taggers and hip-hop is...
Result Page: Previous 3015 3016 3017 3018 3019 3020 3021 3022 3023 3024 3025 3026 3027 3028 3029 3030 3031 3032 3033 3034 3035 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy