Exploratory data analysis (EDA) is about detecting and describing patterns, trends, and relations in data, motivated by certain ...
Weiterlesen
This excellent book highlights all aspects of the analysis and design of buildings subject to impact, explosion and fire. ...
Weiterlesen
Computer Science and Operations Research continue to have a synergistic relationship and this book represents the results ...
Weiterlesen
Portfolio analysis and optimization, together with the associated risk assessment and management, require knowledge of the ...
Weiterlesen
Portfolio analysis and optimization, together with the associated risk assessment and management, require knowledge of the ...
Weiterlesen
The book details the vast progress that has been achieved in the understanding of the physical mechanisms of rogue wave phenomenon ...
Weiterlesen
Problems linking the shape of a domain or the coefficients of an elliptic operator to the sequence of its eigenvalues are ...
Weiterlesen
Problems linking the shape of a domain or the coefficients of an elliptic operator to the sequence of its eigenvalues are ...
Weiterlesen
The book presents an introduction to the project, exhibits partners’ methods and approaches, and provides comprehensive ...
Weiterlesen
This volume contains the proceedings of Formal Methods 2005, the 13th InternationalSymposiumonFormalMethodsheldinNewcastleuponTyne,UK, ...
Weiterlesen
This book presents the refereed proceedings of the 15th International Symposium on Formal Methods, FM 2008, held in Turku, ...
WeiterlesenSharing personal problems and true feeling on social media has a lot of fears and is not likable nowadays, because of bullying, ...
Weiterlesen
Failure Rate Modelling for Reliability and Risk focuses on reliability theory and, specifically, on the failure rate (the ...
Weiterlesen
It addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis ...
Weiterlesen
It addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis ...
Weiterlesen
The Fast Software Encryption 2005 Workshop was the twelfth in a series of annual workshops on symmetric cryptography, sponsored ...
Weiterlesen
Fast Software Encryption (FSE) 2006 is the 13th in a series of workshops on symmetric cryptography. It has been sponsored ...
Weiterlesen
Constitutes the thoroughly refereed proceedings of the 15th International Workshop on Fast Software Encryption, FSE 2008, ...
Weiterlesen
Fast Track to MDX gives you all the necessary background to let you to write useful, powerful MDX expressions and introduces ...
Weiterlesen
The sophistication of the underlying cryptographic algorithms, the high complexity of the implementations, and the easy access ...
Weiterlesen