|
An introduction to mathematical cryptography
|
Jeffrey Hoffstein |
This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics wh… |
OL13764896W |
|
Data structures and algorithm analysis in C++
|
Clifford A. Shaffer |
" A comprehensive treatment that focuses on how to create efficient data structures and algorithms, this text helps readers understand how to select or design the data structure that will best solve … |
OL15980394W |
|
Data structures and the Java collections framework
|
Collins, William J. |
"Instead of emphasizing the underlying mathematics to get programmers to build their own data structures, Collins enables them to manipulate existing structures in the Java Collections Library. This … |
OL15999024W |
|
iPhone cool projects
|
Gary Bennett |
Provides information on creating applications for the iPhone and the iTouch. |
OL16202251W |
|
Data structures and algorithms in C++
|
Michael T. Goodrich |
"An updated, innovative approach to data structures and algorithms Written by an author team of experts in their fields, this authoritative guide demystifies even the most difficult mathematical con… |
OL16414077W |
|
QGIS
|
Anita Graser,Ben Mearns,Alex Mandel,Victor Olaya Ferrero,Alexander Bruy |
Master data management, visualization, and spatial analysis techniques in QGIS and become a GIS power user
About This Book:
• Learn how to work with various types of data and create beautiful map… |
OL19545898W |
|
Shu ju jie gou yu suan fa fen xi
|
Mark Allen Weiss |
Ben shu tao lun le shu ju jie gou he suan fa fen xi, Hai tao lun le gao ji shu ju jie gou ji qi shi xian, Bing zai cheng xu dai ma zhong chong fen ti xian le Java5.0 de xin te xing. |
OL19669469W |
|
Algorithms and Complexity
|
Paul G. Spirakis |
This book constitutes the refereed conference proceedings of the 8th International Conference on Algorithms and Complexity, CIAC 2013, held in Barcelona, Spain, during May 22-24, 2013. The 31 revised… |
OL19825558W |
|
Autonomous, Model-Based Diagnosis Agents
|
Michael Schroeder |
Autonomous, Model-Based Diagnosis Agents defines and describes the implementation of an architecture for autonomous, model-based diagnosis agents. It does this by developing a logic programming appro… |
OL19829388W |
|
Combinatorial Pattern Matching
|
Johannes Fischer |
This book constitutes the refereed proceedings of the 24th Annual Symposium on Combinatorial Pattern Matching, CPM 2013, held in Bad Herrenalb (near Karlsruhe), Germany, in June 2013. The 21 revised … |
OL19835360W |
|
Computed Synchronization for Multimedia Applications
|
Charles B. Owen |
Multimedia is changing the design of database and information retrieval systems. The accumulation of audio, image, and video content is of little use in these systems if the content cannot be retriev… |
OL19836426W |
|
Cross-Language Information Retrieval
|
Gregory Grefenstette |
The universal adoption of the Internet and the WWW have created an enormous, multilingual virtual textual database. Rather than looking upon foreign language documents as distracting noise, one can c… |
OL19838754W |
|
The Data Handbook
|
Brand Fortner |
The Data Handbook was originally published in 1992 by Spyglass, Inc., a Savoy, Illinois-based visualization software publishing company who markets their products primarily to scientists and engineer… |
OL19840061W |
|
Design and Analysis of Algorithms
|
Guy Even |
This book constitutes the refereed proceedings of the First Mediterranean Conference on Algorithms, MedAlg 2012, held in Kibbutz Ein Gedi, Israel, in December 2012. <br>The 18 papers presented were c… |
OL19841319W |
|
Geographical Information Systems in Assessing Natural Hazards
|
Alberto Carrara |
The 16 contributions to Geographical Information Systems in Assessing Natural Hazards report on GIS investigations into landslides, floods, volcanic eruptions, earthquakes and groundwater pollution h… |
OL19852488W |
|
Intrusion Detection in Distributed Systems
|
Peng Ning |
Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribu… |
OL19859329W |
|
Personal wireless communications
|
IFIP TC6/WG6.8 Working Conference on Personal Wireless Communications (2000 Gdańsk, Poland) |
Wireless systems for mobile communication is one of the most rapidly expanding fields in digital telecommunications. Such hot topics as wireless Internet, mobile access to multimedia services and wir… |
OL19894126W |
|
Scalable Enterprise Systems
|
Vittal Prabhu |
The growth in Internet and Information Technology (IT) has led to revolutionary changes in the way businesses are managed and operated. These IT changes have been largely characterized with the term,… |
OL19900699W |
|
Statistical Mining and Data Visualization in Atmospheric Sciences
|
Timothy J. Brown |
Statistical Mining and Data Visualization in Atmospheric Sciences brings together in one place important contributions and up-to-date research results in this fast moving area. Statistical Mining and… |
OL19903876W |
|
Validation and Verification of Knowledge Based Systems
|
Anca Vermesan |
Knowledge-based (KB) technology is being applied to complex problem-solving and critical tasks in many application domains. Concerns have naturally arisen as to the dependability of knowledge-based s… |
OL19909247W |