|
|
Geometric Fundamentals of Robotics (Monographs in Computer Science)Geometric Fundamentals of Robotics provides an elegant introduction to the geometric concepts that are important to applications in robotics. This second edition is still unique in providing a deep understanding of the subject: rather than focusing on computational results in kinematics and robotics, it includes significant state-of-the... | | New Computational Paradigms: Changing Conceptions of What is ComputableIn recent years, classical computability has expanded beyond its original scope to address issues related to computability and complexity in algebra, analysis, and physics. The deep interconnection between "computation" and "proof" has originated much of the most significant work in constructive mathematics and mathematical... | | Next Generation Intelligent Optical Networks: From Access to BackboneOptical networks have been in commercial deployment since the early 1980s as a result of advances in optical, photonic, and material technologies. Although the initial deployment was based on silica fiber with a single wavelength modulated at low data rates, it was quickly demonstrated that fiber can deliver much more bandwidth than any other... |
|
Computer Algebra Recipes: An Advanced Guide to Scientific ModelingA computer algebra system (CAS) not only has the number \crunching" and plotting capability of traditional computing languages such as Fortran and C, but also allows one to perform the symbolic manipulations and derivations required in most mathematically based science and engineering courses. To introduce students in these disciplines to... | | Bayesian Networks and Influence Diagrams: A Guide to Construction and Analysis (Information Science and Statistics)Probabilistic networks, also known as Bayesian networks and influence diagrams, have become one of the most promising technologies in the area of applied artificial intelligence, offering intuitive, efficient, and reliable methods for diagnosis, prediction, decision making, classification, troubleshooting, and data mining under uncertainty.... | | Handbook of Database Security: Applications and TrendsDatabase security has been gaining a great deal of importance as industry, military, and government organizations have increasingly adopted Internet-based technologies on a large-scale, because of convenience, ease of use, and the ability to take advantage of rapid advances in the commercial market. Along with the traditional security aspects of... |
|
Quality of Service in Optical Burst Switched Networks (Optical Networks)Optical Burst Switching (OBS) is a promising switching architecture to support huge bandwidth demand in optical backbone networks that useWavelength Division Multiplexing (WDM) technology. Due to its special features which combine the merits of optical circuit switching and packet switching, it can support high-speedtransmission with fine... | | | | |
|
Smart Cards, Tokens, Security and ApplicationsSmart Cards, Tokens, Security and Applications provides a broad overview of the many card systems and solutions that are in practical use today. This state-of-the art work is written by contributing authors who are active researchers and acknowledged experts in their field. A single book cannot be found to match both the breadth... | | Toward Artificial Sapience: Principles and Methods for Wise SystemsThe current attempt to emulate human sapience (wisdom) by artificial means should be a step in the right direction beyond the Artificial/Computational Intelligence and Soft Computing disciplines, but is it warranted? Have humans achieved a level of modeling smart systems that justifies talking about sapience-wisdom?
This book presents... | | Wireless Network Security (Signals and Communication Technology)Wireless networks technologies have been dramatically improved by the popularity of third generation (3G) wireless networks, wireless LANs, Bluetooth, and sensor networks. However, security is a major concern for wide deployments of such wireless networks. The contributions to this volume identify various vulnerabilities in the physical layer, the... |
|
Result Page: 422 421 420 419 418 417 416 415 414 413 412 411 410 409 408 407 406 405 404 |