الكتب الالكترونية

عدد الكتب: 81 - 100 /177
978-1-4020-4755-8
Event Structure and the Left Periphery

This book provides substantial new results in a novel field of research examining the syntactic and semantic consequences ...

اقرأ المزيد
978-1-4020-6197-4
Existence: Semantics and Syntax

This collection is an important contribution to the semantic and syntactic analysis of the expression of existence. The volume ...

اقرأ المزيد
978-3-540-39507-2
FLOMANIA - A European Initiative on Flow Physics Modelling

The book presents an introduction to the project, exhibits partners’ methods and approaches, and provides comprehensive ...

اقرأ المزيد
NoIMG
Fashionity / Faisal Shamma , Firas Barakat , Marwan Alkawadri and Mouaz Sharbaji ; supervised by Raouf Hamdan and Khloud Aljallad فيصل شما ، فراس بركات ، مروان اياد القوادري و معاذ شربجي ؛ إشراف رؤوف حمدان و خلود الجلاد

This project is an AI fashion design system to generate fashion images based on user textual description. The proposed system ...

اقرأ المزيد
978-3-540-74619-5
Fast Software Encryption

It addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis ...

اقرأ المزيد
978-3-540-74619-5
Fast Software Encryption

It addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis ...

اقرأ المزيد
978-3-540-36598-3
Fast Software Encryption (vol. # 4047)

Fast Software Encryption (FSE) 2006 is the 13th in a series of workshops on symmetric cryptography. It has been sponsored ...

اقرأ المزيد
978-3-540-46251-4
Fault Diagnosis and Tolerance in Cryptography

The sophistication of the underlying cryptographic algorithms, the high complexity of the implementations, and the easy access ...

اقرأ المزيد
1118822617
Forty Ways to Think About Architecture: Architectural History and Theory Today / Iain Borden, Murray Fraser, Barbara Penner

How do we think about architecture historically and theoretically? Forty Ways to Think about Architecture provides an introduction ...

اقرأ المزيد
978-3-540-74236-4
Fossil Earthquakes: The Formation and Preservation of Pseudotachylytes

This book encompass the principl results of field investigations, analyses of meso-scale and micro-scale textures and structures, ...

اقرأ المزيد
978-3-540-31936-8
Foundations of Security Analysis and Design III

The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested ...

اقرأ المزيد
978-3-540-74810-6
Foundations of Security Analysis and Design IV

This book presents thoroughly revised versions of eight tutorial lectures given by leading researchers during two International ...

اقرأ المزيد
NoIMG
Generative adversarial text to image synthesis / Adel Al-Laham ; Ahmad Hassouneh ; Yazan Al-Khatib ; Mhd Anas Kamel

Synthesizing high-quality images from text descriptions is a challenging problem in computer vision and has many practical ...

اقرأ المزيد
978-3-662-58709-6
Handbook of Contact Mechanics : Exact Solutions of Axisymmetric Contact Problems

This book contains a structured collection of complete solutions of all significant axially symmetric contact problems. It ...

اقرأ المزيد
NoIMG
Handbook of Modern Sensors. Physics, Designs, and Applications / Jacob Fraden

Presents a comprehensive and up-to-date account of the theory (physical principles), design, and practical implementations ...

اقرأ المزيد
978-3-540-27548-0
Impact Tectonics

This volume is the 8th in a series of impact books resulting from the activities of the scientific program "Response of ...

اقرأ المزيد
978-1-4020-4889-0
Inductive Dependency Parsing

This book provides an in-depth description of the framework of inductive dependency parsing, a methodology for robust and ...

اقرأ المزيد
978-3-540-31815-6
Information Security Applications (vol. # 3325)

The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August ...

اقرأ المزيد
978-3-540-79966-5
Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks : Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings

This volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security ...

اقرأ المزيد
978-3-540-32424-9
Information Security and Cryptology (vol. # 3822)

The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory ...

اقرأ المزيد
عدد الكتب: 81 - 100 /177