Exploratory data analysis (EDA) is about detecting and describing patterns, trends, and relations in data, motivated by certain ...
اقرأ المزيدThis excellent book highlights all aspects of the analysis and design of buildings subject to impact, explosion and fire. ...
اقرأ المزيدComputer Science and Operations Research continue to have a synergistic relationship and this book represents the results ...
اقرأ المزيدPortfolio analysis and optimization, together with the associated risk assessment and management, require knowledge of the ...
اقرأ المزيدPortfolio analysis and optimization, together with the associated risk assessment and management, require knowledge of the ...
اقرأ المزيدThe book details the vast progress that has been achieved in the understanding of the physical mechanisms of rogue wave phenomenon ...
اقرأ المزيدProblems linking the shape of a domain or the coefficients of an elliptic operator to the sequence of its eigenvalues are ...
اقرأ المزيدProblems linking the shape of a domain or the coefficients of an elliptic operator to the sequence of its eigenvalues are ...
اقرأ المزيدThe book presents an introduction to the project, exhibits partners’ methods and approaches, and provides comprehensive ...
اقرأ المزيدThis volume contains the proceedings of Formal Methods 2005, the 13th InternationalSymposiumonFormalMethodsheldinNewcastleuponTyne,UK, ...
اقرأ المزيدThis book presents the refereed proceedings of the 15th International Symposium on Formal Methods, FM 2008, held in Turku, ...
اقرأ المزيدSharing personal problems and true feeling on social media has a lot of fears and is not likable nowadays, because of bullying, ...
اقرأ المزيدFailure Rate Modelling for Reliability and Risk focuses on reliability theory and, specifically, on the failure rate (the ...
اقرأ المزيدIt addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis ...
اقرأ المزيدIt addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis ...
اقرأ المزيدThe Fast Software Encryption 2005 Workshop was the twelfth in a series of annual workshops on symmetric cryptography, sponsored ...
اقرأ المزيدFast Software Encryption (FSE) 2006 is the 13th in a series of workshops on symmetric cryptography. It has been sponsored ...
اقرأ المزيدConstitutes the thoroughly refereed proceedings of the 15th International Workshop on Fast Software Encryption, FSE 2008, ...
اقرأ المزيدFast Track to MDX gives you all the necessary background to let you to write useful, powerful MDX expressions and introduces ...
اقرأ المزيدThe sophistication of the underlying cryptographic algorithms, the high complexity of the implementations, and the easy access ...
اقرأ المزيد