Katalog
No. Katalog | Katalog | Subjek | Actions |
---|---|---|---|
171836 results (page 9516/17184) | |||
![]()
17.01.619 |
Modern Cryptanalysis: Techniques for Advanced Code Breaking tersedia 1 koleksi total 1 koleksi |
COMPUTER SECURITY
As an instructor at the University of Tulsa, Christopher Swenson could find no relevant text for teaching modern cryptanalysis?so he wrote his own. This is the first book that brings..selengkapnya..
|
|
![]()
17.01.620 |
Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics and Speech Recognition, 2/E. tersedia 2 koleksi total 2 koleksi |
NATURAL LANGUAGE PROCESSING
An explosion of Web-based language techniques, merging of distinct fields, availability of phone-based dialogue systems and much more make this an exciting time in speech and language processing. The first..selengkapnya..
|
|
![]()
17.01.621 |
Hiding in Plain Slight: Steganography and the Art of Covert Communication tersedia 2 koleksi total 2 koleksi tersedia 1 file download |
COMPUTER SECURITY
- Explains exactly what steganography is-hiding a message inside an innocuous picture or music file-and how it has become a popular tool for secretly sending and receiving messages for both..selengkapnya..
|
|
![]()
17.01.622 |
The Description Logic Handbook: Theory, Implementation and Applications, 2/E. tersedia 2 koleksi total 2 koleksi |
ARTIFICIAL INTELLIGENCE
Description logics
Description logics are embodied in several knowledge-based systems and are used to develop various real-life applications. Now in paperback, The Description Logic Handbook provides a thorough account of the subject,..selengkapnya..
|
|
![]()
17.01.623 |
Guide to Reliable Internet Services and Applications;
Computer Communications and Networks tersedia 2 koleksi total 2 koleksi |
COMPUTER NETWORKS
An oft-repeated adage among telecommunication providers goes, “There are ve things that matter: reliability, reliability, reliability, time to market, and cost. If you can’t do all ve, at least do..selengkapnya..
|
|
![]()
17.01.624 |
Queueing Modelling Fundamentals: With Applications in Communication Networks tersedia 4 koleksi total 4 koleksi |
QUEUING THEORY
Queueing analysis is a vital tool used in the evaluation of system performance. Applications of queueing analysis cover a wide spectrum from bank automated teller machines to transportation and communications..selengkapnya..
|
|
![]()
17.01.625 |
Internet Technologies and Information Services, 2/E. tersedia 2 koleksi total 2 koleksi |
LIBRARY INFORMATION SYSTEMS
The Internet has enabled the convergence of all things information-related. This book provides essential, foundational knowledge of the application of Internet and web technologies in the information and library professions...selengkapnya..
|
|
![]()
17.01.626 |
The Nature of Mathematical Modeling tersedia 2 koleksi total 2 koleksi |
MATHEMATICAL MODELS
This book first covers exact and approximate analytical techniques (ordinary differential and difference equations, partial differential equations, variational principles, stochastic processes); numerical methods (finite differences for ODE's and PDE's, finite..selengkapnya..
|
|
![]()
17.01.627 |
Social Big Data Mining tersedia 1 koleksi total 2 koleksi |
DATA MINING
BIG DATA,
This book focuses on the basic concepts and the related technologies of data mining for social medial. Topics include: big data and social data, data mining for making a hypothesis,..selengkapnya..
|
|
![]()
17.01.628 |
Information Hiding Text in Image: Encryption tersedia 1 koleksi total 2 koleksi |
COMPUTER SECURITY
Sensitive and confidential information is vulnerable to various kinds of misuse when data contained in, or transmitted to / from computer systems they may exposed to passive and / or..selengkapnya..
|
|