Posada Jamaica (1939) | All Around the Moon | Bangkok Nites 2017
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Solving Applied Mathematical Problems with MATLAB
Solving Applied Mathematical Problems with MATLAB

This textbook presents a variety of applied mathematics topics in science and engineering with an emphasis on problem solving techniques using MATLAB®. The authors provide a general overview of the MATLAB language and its graphics abilities before delving into problem solving, making the book useful for readers without prior...

Spectral Logic and Its Applications for the Design of Digital Devices
Spectral Logic and Its Applications for the Design of Digital Devices

Spectral techniques facilitate the design and testing of today's increasingly complex digital devices

There is heightened interest in spectral techniques for the design of digital devices dictated by ever increasing demands on technology that often cannot be met by classical approaches. Spectral methods provide a uniform
...

Graph Theory: A Problem Oriented Approach (Mathematical Association of America Textbooks)
Graph Theory: A Problem Oriented Approach (Mathematical Association of America Textbooks)

Graph Theory presents a natural, reader-friendly way to learn some of the essential ideas of graph theory starting from first principles. The format is similar to the companion text, Combinatorics: A Problem Oriented Approach also by Daniel A. Marcus, in that it combines the features of a textbook with those of a problem...

How to Think About Algorithms
How to Think About Algorithms
There are many algorithm texts that provide lots of well-polished code and proofs of correctness. This book is not one of them. Instead, this book presents insights, notations, and analogies to help the novice describe and think about algorithms like an expert. By looking at both the big picture and easy step-by-step methods for developing...
Elliptic Curves: Number Theory and Cryptography, Second Edition (Discrete Mathematics and Its Applications)
Elliptic Curves: Number Theory and Cryptography, Second Edition (Discrete Mathematics and Its Applications)
Over the last two or three decades, elliptic curves have been playing an increasingly important role both in number theory and in related fields such as cryptography. For example, in the 1980s, elliptic curves started being used in cryptography and elliptic curve techniques were developed for factorization and primality...
Bosch
Bosch
“The difference between this painter’s works and those of others: they seek to paint men as they appear on the outside, whereas he endeavours to paint the inner man, as he is on the inside.”

1453: Birth of Hieronymus Van Aken in ‘s-Hertogenbosch (now Bois-le-Duc). His family, of...
Post Quantum Cryptography
Post Quantum Cryptography
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature...
Algorithms and Programming: Problems and Solutions (Modern Birkhäuser Classics)
Algorithms and Programming: Problems and Solutions (Modern Birkhäuser Classics)
Somebody once said that one may prove the correctness of an algorithm, but not of a program. One of the main goals of this book is to convince the reader that things are not so bad.

A well-known programmer, C.A.R. Hoare, said that the beauty of a program is not an additional benefit but a criterion that separates success from failure.
...
String Theory Demystified
String Theory Demystified

UNRAVEL the mystery of STRING THEORY

Trying to understand string theory but ending up with your brain in knots? Here's your lifeline! This straightforward guide explains the fundamental principles behind this cutting-edge concept.

String Theory...

Open-Source ESBs in Action
Open-Source ESBs in Action
Most modern business systems include independent applications that exchange information with each other-a technique usually called enterprise integration. An architectural approach called the Enterprise Service Bus (ESB) offers developers a way to handle the messages between those independent applications without creating a lot of custom code....
Swarm Intelligence: Introduction and Applications (Natural Computing Series)
Swarm Intelligence: Introduction and Applications (Natural Computing Series)
The laws that govern the collective behavior of social insects, flocks of birds, or fish schools continue to mesmerize researchers. While individuals are rather unsophisticated, in cooperation they can solve complex tasks, a prime example being the ability of ant colonies to find shortest paths between their nests and food sources. Task-solving...
Wireless Personal Area Networks: Performance, Interconnection, and Security with IEEE 802.15.4
Wireless Personal Area Networks: Performance, Interconnection, and Security with IEEE 802.15.4
Wireless personal area networks and wireless sensor networks are rapidly gaining popularity, and the IEEE 802.15 Wireless Personal Area Working Group has defined no less than three different standards so as to cater to the requirements of different applications. One of them is the low data rate WPAN known as 802.15.4, which covers a broad range of...
Result Page: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy