A rich examination of the technologies supporting secure digital information transfers from respected leaders in the field Is ...
WeiterlesenThe present volume originated in 2001 when we, together with our publishing editors at (then) Kluwer Academic Publishers, ...
WeiterlesenThis survey on the modernity of ethnomathematics addresses numerous themes related to both ethnomathematics and mathematics ...
WeiterlesenComputer graphics is important in many areas including engineering design, architecture, education, and computer art and ...
WeiterlesenThis volume is one of the very few publications dedicated to the challenges that Continental philosophy poses to the field ...
WeiterlesenIts objective is to present various numerical methods for solving certain mathematical problems on the computer that cannot ...
WeiterlesenThis textbook is an introduction to Scientific Calculus, illustrating various numerical methods for the computer solution ...
WeiterlesenD-modules continues to be an active area of stimulating research in such mathematical areas as algebra, analysis, differential ...
WeiterlesenData Assimilation comprehensively covers data assimilation and inverse methods, including both traditional state estimation ...
WeiterlesenThis book addresses an urgent issue on which little organized information exists. It reflects experience in Africa but is ...
WeiterlesenDelivers a comprehensive treatment of the mathematical and statistical models useful for analyzing data sets arising in various ...
WeiterlesenThis volume collects the papers presented at the 10th International Conference on Database Theory, ICDT 2005, held during ...
WeiterlesenThis book explores commentaries on an influential text of pre-Copernican astronomy in Europe. It features essays that take ...
WeiterlesenThe book concentrates on decision procedures for first-order theories that are commonly used in automated verification and ...
WeiterlesenThis textbook for students and practitioners presents a practical approach to decomposition techniques in optimization. It ...
WeiterlesenCryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...
WeiterlesenCryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...
WeiterlesenWhat is a proof for? What is the characteristic use of a proof as a computation, as opposed to its use as an experiment? ...
WeiterlesenDiscusses a broad overview of traditional machine learning methods and state-of-the-art deep learning practices for hardware ...
WeiterlesenProvides an overview of different deep learning-based methods for face recognition and related problems. Specifically, the ...
Weiterlesen