Home | Amazing | Today | Tags | Publishers | Years | Search 
VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security (Mathematics and Visualization)
VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security (Mathematics and Visualization)
Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide security analysts with better tools to discover patterns, detect anomalies, identify correlations, and communicate their findings. Visualization for computer security (VizSec) researchers and developers are...
Tools for High Performance Computing: Proceedings of the 2nd International Workshop on Parallel Tools for High Performance Computing, July 2008, HLRS, Stuttgart
Tools for High Performance Computing: Proceedings of the 2nd International Workshop on Parallel Tools for High Performance Computing, July 2008, HLRS, Stuttgart
With the advent of multi-core processors, implementing parallel programming methods in application development is absolutely necessary in order to achieve good performance. Soon, 8-core and possibly 16-core processors will be available, even for desktop machines. To support application developers in the various tasks involved in this process,...
Physics for Computer Science Students: With Emphasis on Atomic and Semiconductor Physics
Physics for Computer Science Students: With Emphasis on Atomic and Semiconductor Physics
This text is intended to teach the fundamentals of physics to computer scientists, electrical engineers, and others interested in electronics. The presentation is thus directed toward understanding the fundamental physics of how a computer works, while still providing a broad and effective one-year introduction to classical and modern physics. The...
DNA Computing Models (Advances in Information Security)
DNA Computing Models (Advances in Information Security)
Sir Francis Crick would undoubtedly be at the front of the line ordering this fascinating book. Being one of the discoverers of DNA, he would be amazed at how his work has been applied to mankind's most important invention, the computer. DNA contains the genetic instructions for the biological development of cellular life forms or viruses. DNA...
Privacy-Preserving Data Mining: Models and Algorithms (Advances in Database Systems)
Privacy-Preserving Data Mining: Models and Algorithms (Advances in Database Systems)
Advances in hardware technology have increased the capability to store and record personal data about consumers and individuals, causing concerns that personal data may be used for a variety of intrusive or malicious purposes.

Privacy-Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the...

Unifying Perspectives in Computational and Robot Vision (Lecture Notes in Electrical Engineering)
Unifying Perspectives in Computational and Robot Vision (Lecture Notes in Electrical Engineering)
Currently there is a gap between the research conducted in computer vision and robotics communities. There are many characteristics in common in computer vision research and vision research in robotics. Despite having these common interests, however, pure computer vision has seen significant theoretical and methodological advances during the last...
Intrusion Detection Systems (Advances in Information Security)
Intrusion Detection Systems (Advances in Information Security)
In our world of ever-increasing Internet connectivity, there is an on-going threat of intrusion, denial of service attacks, or countless other abuses of computer and network resources. In particular, these threats continue to persist due to the flaws of current commercial intrusion detection systems (IDSs).

Intrusion...

The Designer's Guide to SPICE and Spectre® (The Designer's Guide Book Series)
The Designer's Guide to SPICE and Spectre® (The Designer's Guide Book Series)
The Designer's Guide to SPICE and Spectre® is an in-depth guide to circuit simulators from a designer's perspective: the pitfalls of circuit simulation, such as convergence and accuracy problems, are explained in terms a circuit designer is comfortable with. The book gives designers insight into why these problems occur and how to...
Concurrency, Graphs and Models: Essays Dedicated to Ugo Montanari on the Occasion of His 65th Birthday
Concurrency, Graphs and Models: Essays Dedicated to Ugo Montanari on the Occasion of His 65th Birthday
This Festschrift volume, pubished in honor of Ugo Montanari on the occasion of his 65th birthday, contains 43 papers, written by friends and colleagues, all leading scientists in their own right, who congregated at a celebratory symposium held on June 12, 2008, in Pisa.

 

The volume consists of seven sections, six of...

Linear and Nonlinear Programming: Third Edition (International Series in Operations Research & Management Science)
Linear and Nonlinear Programming: Third Edition (International Series in Operations Research & Management Science)
"Linear and Nonlinear Programming" is considered a classic textbook in Optimization. While it is a classic, it also reflects modern theoretical insights. These insights provide structure to what might otherwise be simply a collection of techniques and results, and this is valuable both as a means for learning existing material and for...
Software for Data Analysis: Programming with R (Statistics and Computing)
Software for Data Analysis: Programming with R (Statistics and Computing)
This is a book about Software for Data Analysis: using computer software to extract information from some source of data by organizing, visualizing, modeling, or performing any other relevant computation on the data. We all seem to be swimming in oceans of data in the modern world, and tasks ranging from scientific research to managing a business...
The Burrows-Wheeler Transform: Data Compression, Suffix Arrays, and Pattern Matching
The Burrows-Wheeler Transform: Data Compression, Suffix Arrays, and Pattern Matching
The Burrows-Wheeler Transform is a text transformation scheme that has found applications in different aspects of the data explosion problem, from data compression to index structures and search. The BWT belongs to a new class of compression algorithms, distinguished by its ability to perform compression by sorted contexts. More recently, the BWT...
Result Page: 402 401 400 399 398 397 396 395 394 393 392 391 390 389 388 387 386 385 384 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy