إجمالي الكتب: 1369 - 1386 / 3461
إجمالي الكتب: 1369 - 1386 / 3461
A Matrix Algebra Approach to Artificial Intelligence
The book consists of two parts: the first discusses the fundamentals of matrix algebra in detail, while the second focuses on the applications of matrix algebra approaches in AI. Highlighting matrix algebra in graph-based learning and embedding, network embedding, convolutional neural networks and Pareto optimization theory, and discussing recent topics and advances, the book offers a valuable resource for scientists, engineers, and graduate students in various disciplines
A journey of embedded and cyber-physical systems : Essays dedicated to Peter Marwedel on the occasion of his 70th birthday
This book celebrates Professor Peter Marwedel's outstanding achievements in compilers, embedded systems, and cyber-physical systems. The contributions in the book summarize the content of invited lectures given at the workshop “Embedded Systems” held at the Technical University Dortmund in early July 2019 in honor of Professor Marwedel's seventieth birthday.
A High-Performance Logical Framework -- All About Maude : How to Specify, Program, and Verify Systems in Rewriting Logic
This book gives a comprehensive account of Maude, a language and system based on rewriting logic. Many examples are used throughout the book to illustrate the main ideas and features of Maude, and its many possible uses. Maude modules are rewrite theories. Computation with such modules is - cient deduction by rewriting. Because of its logical basis and its initial model semantics,aMaude module defines a precise mathematical model.This means that Maude and its formal tool environment can be used in three, mutually reinforcing ways: • as a declarative programming language; • as an executable formal specification language; and • as a formal verification system. Maude’s rewriting logic is simple, yet very expressive. This gives Maude good representational capabilities as a semantic framework to formally represent a wide range of systems, including models of concurrency, distributed al- rithms, network protocols, semantics of programming languages, and models of cell biology. Rewriting logic is also an expressive universal logic,making Maude a fiexible logical framework in which many difierent logics and - ference systems can be represented and mechanized. This makes Maude a useful metatool to build many other tools, including those in its own formal tool environment. Thanks to the logic’s simplicity and the use of advanced semi-compilation techniques, Maude has a high-performance implementation, making it competitive with other declarative programming languages.
A Graph-Theoretic Approach to Enterprise Network Dynamics
This monograph treats the application of numerous graph-theoretic algorithms to a comprehensive analysis of dynamic enterprise networks. Network dynamics analysis yields valuable information about network performance, efficiency, fault prediction, cost optimization, indicators and warnings.
A General introduction to data analytics
A guide to the principles and methods of data analysis that does not require knowledge of statistics or programming. A guide to the reasoning behind data mining techniques. A unique illustrative example that extends throughout all the chapters. Exercises at the end of each chapter and larger projects at the end of each of the text’s two main parts
A First Course in Statistical Inference
Offers a modern and accessible introduction to Statistical Inference, the science of inferring key information from data. Aimed at beginning undergraduate students in mathematics, it presents the concepts underpinning frequentist statistical theory. Written in a conversational and informal style, this concise text concentrates on ideas and concepts, with key theorems stated and proved. Detailed worked examples are included and each chapter ends with a set of exercises, with full solutions given at the back of the book. Examples using R are provided throughout the book, with a brief guide to the software included. Topics covered in the book include: sampling distributions, properties of estimators, confidence intervals, hypothesis testing, ANOVA, and fitting a straight line to paired data.
A first course in differential equations with modeling applications
A comprehensive treatment of ordinary differential equations, concisely presenting basic and essential results in a rigorous manner. Including various examples from physics, mechanics, natural sciences, engineering and automatic theory, Differential Equations is a bridge between the abstract theory of differential equations and applied systems theory.
A Concise Introduction to Software Engineering
This text focuses on the essential elements, providing readers with the basic skills and introductory knowledge required to execute a software project successfully.
A Concise Introduction to Languages and Machines
This easy-to-follow text provides an accessible introduction to the key topics of formal languages and abstract machines within Computer Science.
A Concise Introduction to Data Compression
Compressing data is an option naturally selected when faced with problems of high costs or restricted space. Written by a renowned expert in the field, this book offers readers a succinct, reader-friendly foundation to the chief approaches, methods and techniques currently employed in the field of data compression.
A Computational Model of Natural Language Communication : Interpretation, Inference, and Production in Database Semantics
Part I of this book presents a high-level description of an artificial agent which humans can freely communicate with in their accustomed language. Part II analyzes the major constructions of natural language, i.e., intra- and extrapropositional functor - argument structure, coordination, and coreference, in the speaker and the hearer mode. Part III defines declarative specifications for fragments of English, which are used for an implementation in Java.
A Classical Introduction to Cryptography Exercise Book
A Classical Introduction to Cryptography Exercise Book for A Classical Introduction to Cryptography: Applications for Communications Security covers a majority of the subjects that make up today's cryptology, such as symmetric or public-key cryptography, cryptographic protocols, design, cryptanalysis, and implementation of cryptosystems. Exercises do not require a large background in mathematics, since the most important notions are introduced and discussed in many of the exercises.
A Classical Introduction to Cryptography : Applications for Communications Security
This advanced-level textbook covers conventional cryptographic primitives and cryptanalysis of these primitives; basic algebra and number theory for cryptologists; public key cryptography and cryptanalysis of these schemes; and other cryptographic protocols, e.g. secret sharing, zero-knowledge proofs and undeniable signature schemes.
A Brief History of Computing
This text provides a comprehensive introduction to the key topics in the history of computing, in an easy-to-follow and concise manner. It covers the significant areas and events in the field.
6G Mobile Wireless Networks
Specifically, this book covers the following topics: 6G Use Cases, Requirements, Metrics and Enabling Technologies, PHY Technologies for 6G Wireless, Reconfigurable Intelligent Surface for 6G Wireless Networks, Millimeter-wave and Terahertz Spectrum for 6G Wireless, Challenges in Transport Layer for Tbit/s Communications, High-capacity Backhaul Connectivity for 6G Wireless, Cloud Native Approach for 6G Wireless Networks, Machine Type Communications in 6G, Edge Intelligence and Pervasive AI in 6G, Blockchain: Foundations and Role in 6G, Role of Open-source Platforms in 6G, and Quantum Computing and 6G Wireless.
50 Years of Artificial Intelligence : Essays Dedicated to the 50th Anniversary of Artificial Intelligence
This Festschrift volume, published in celebration of the 50th Anniversary of Artificial Intelligence, includes 34 refereed papers written by leading researchers in the field of Artificial Intelligence. The papers were carefully selected from the invited lectures given at the 50th Anniversary Summit of AI, held at the Centro Stefano Franscini, Monte Verità, Ascona, Switzerland, July 9-14, 2006. The summit provided a venue for discussions on a broad range of topics.
3-D Shape Estimation and Image Restoration : Exploiting Defocus and Motion-Blur
Images contain information about the spatial properties of the scene they depict. When coupled with suitable assumptions, images can be used to infer three-dimensional information. This useful volume concentrates on motion blur and defocus, which can be exploited to infer the 3-D structure of a scene—as well as its radiance properties—and which in turn can be used to generate novel images with better quality. 3-D Shape Estimation and Image Restoration presents a coherent framework for the analysis and design of algorithms to estimate 3-D shape from defocused and motion blurred images, and to eliminate defocus and motion blur to yield "restored" images. It provides a collection of algorithms that are optimal with respect to the chosen model and estimation criterion.
3D Mesh processing and character animation : with examples using OpenGL, OpenMesh and Assimp
Focusses specifically on topics that are important in three-dimensional modelling, surface design and real-time character animation. It provides an in-depth coverage of data structures and popular methods used in geometry processing, keyframe and inverse kinematics animations and shader based processing of mesh objects. It also introduces two powerful and versatile libraries, OpenMesh and Assimp, and demonstrates their usefulness through implementations of a wide range of algorithms in mesh processing and character animation respectively. This Textbook is written for students at an advanced undergraduate or postgraduate level who are interested in the study and development of graphics algorithms for three-dimensional mesh modeling and analysis, and animations of rigged character models.
إجمالي الكتب: 1369 - 1386 / 3461

















