Free Delivery Over $100
11085 books were found.
Computational Techniques for the Summation of Series is a text on the representation of series in closed form. This... Read More >>
This book constitutes the thoroughly refereed post-workshop proceedings of the 9th International Workshop on Rewriting... Read More >>
Bringing together key researchers in disciplines ranging from visualization and image processing to applications... Read More >>
In January 2012 an Oberwolfach workshop took place on the topic of recent developments in the numerics of partial... Read More >>
Computer Arithmetic provides a complete procedure for linking the digital design and arithmetic algorithms domain,... Read More >>
This book constitutes the refereed proceedings of the 8th International Conference on Advances in Natural Language... Read More >>
Constitutes the refereed proceedings of the Third International Conference on Information Computing and Applications,... Read More >>
Constitutes the thoroughly refereed proceedings of the 5th International Symposium on Leveraging Applications of... Read More >>
This book discusses how to use information available on the Web to supply company data warehouses. Read More >>
Read More >>
A framework for network security which may be used by the military, government, industry, and academia network personnel.... Read More >>
The aim of the book is to represent a new object-oriented methodology called Tabular Application Development (TAD).... Read More >>
An understanding of modern computer logic - incorporating core knowledge of number systems, number conversions,... Read More >>
""The NCL Natural Constraint Language"" presents the NCL language which is a description language in conventional... Read More >>
This volume contains the articles presented at the 21st International Meshing Roundtable (IMR) organized, in part,... Read More >>
This book constitutes the thoroughly reviewed post-proceedings of the 8th International Workshop on Argumentation... Read More >>
The importance of having ef cient and effective methods for data mining and kn- ledge discovery (DM&KD), to which... Read More >>
This unique and practical text introduces the principles of WLANs based upon the IEEE 802.11 standards, demonstrating... Read More >>
Obsession with computational biology and theoretical approaches is evidenced in articles hailing the arrival of... Read More >>
The assumed reader should have some ba- ground in logic (an elementary course covering classical propositional and... Read More >>
IT Security Management provides an insight on how to create and stimulate a team of passionate IT security professionals,... Read More >>
In the applications part a number of representative examples of really using CA in a broad range of disciplines... Read More >>
This unique reference offers a statistical methodology for practitioners and testers of biometric authentication... Read More >>
Topics and features: uses an in-depth bottom-up approach to the topic of microcontroller design using the Microchip... Read More >>