الكتب الالكترونية

عدد الكتب: 161 - 172 /172
978-0-387-78909-5
The Burrows-Wheeler Transform: Data Compression, Suffix Arrays, and Pattern Matching

This book will serve as a reference for seasoned professionals or researchers in the area, while remaining accessible for ...

اقرأ المزيد
978-3-030-00578-8
The Everyday Life of an Algorithm

This book begins with an algorithm–a set of IF…THEN rules used in the development of a new, ethical, video surveillance ...

اقرأ المزيد
978-3-540-77659-8
The Modern Algebra of Information Retrieval

This book takes a unique approach to information retrieval by laying down the foundations for a modern algebra of information ...

اقرأ المزيد
1119724414
The Self-Taught Computer Scientist: The Beginner's Guide to Data Structures & Algorithms / Cory Althoff

Introduces beginner and self-taught programmers to computer science fundamentals that are essential for success in programming ...

اقرأ المزيد
978-1-84628-263-8
Theoretical Introduction to Programming

Is there nothing more to programming? How can you develop your skill if all you do is hunt for the prescribed routine in ...

اقرأ المزيد
978-3-540-33261-9
Triangulations and Applications

This book is entirely about triangulations. With emphasis on computational issues, we present the basic theory necessary ...

اقرأ المزيد
978-0-387-09428-1
Trust Management II : Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway

The scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...

اقرأ المزيد
978-3-030-05819-7
VR Technologies in Cultural Heritage

Tthis volume are organized in topical sections on data acquisition and modelling, visualization methods / audio, sensors ...

اقرأ المزيد
978-3-540-69738-1
Verification, Model Checking, and Abstract Interpretation

This volume contains the papers presented at VMCAI 2007: Verification, Model Checking and Abstract Interpretation held January ...

اقرأ المزيد
978-3-540-85933-8
Visualization for Computer Security : 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings

This book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.

اقرأ المزيد
978-3-540-78243-8
VizSEC 2007 : Proceedings of the Workshop on Visualization for Computer Security

Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber ...

اقرأ المزيد
978-3-540-77891-2
WALCOM: Algorithms and Computation : Second International Workshop, WALCOM 2008, Dhaka, Bangladesh, February 7-8, 2008. Proceedings

This book features original research in the areas of algorithms and data structures, combinatorial algorithms, graph drawings ...

اقرأ المزيد
عدد الكتب: 161 - 172 /172