Exploratory data analysis (EDA) is about detecting and describing patterns, trends, and relations in data, motivated by certain ...
WeiterlesenThis excellent book highlights all aspects of the analysis and design of buildings subject to impact, explosion and fire. ...
WeiterlesenComputer Science and Operations Research continue to have a synergistic relationship and this book represents the results ...
WeiterlesenPortfolio analysis and optimization, together with the associated risk assessment and management, require knowledge of the ...
WeiterlesenPortfolio analysis and optimization, together with the associated risk assessment and management, require knowledge of the ...
WeiterlesenThe book details the vast progress that has been achieved in the understanding of the physical mechanisms of rogue wave phenomenon ...
WeiterlesenProblems linking the shape of a domain or the coefficients of an elliptic operator to the sequence of its eigenvalues are ...
WeiterlesenProblems linking the shape of a domain or the coefficients of an elliptic operator to the sequence of its eigenvalues are ...
WeiterlesenThe book presents an introduction to the project, exhibits partners’ methods and approaches, and provides comprehensive ...
WeiterlesenThis volume contains the proceedings of Formal Methods 2005, the 13th InternationalSymposiumonFormalMethodsheldinNewcastleuponTyne,UK, ...
WeiterlesenThis book presents the refereed proceedings of the 15th International Symposium on Formal Methods, FM 2008, held in Turku, ...
WeiterlesenSharing personal problems and true feeling on social media has a lot of fears and is not likable nowadays, because of bullying, ...
WeiterlesenFailure Rate Modelling for Reliability and Risk focuses on reliability theory and, specifically, on the failure rate (the ...
WeiterlesenIt addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis ...
WeiterlesenIt addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis ...
WeiterlesenThe Fast Software Encryption 2005 Workshop was the twelfth in a series of annual workshops on symmetric cryptography, sponsored ...
WeiterlesenFast Software Encryption (FSE) 2006 is the 13th in a series of workshops on symmetric cryptography. It has been sponsored ...
WeiterlesenConstitutes the thoroughly refereed proceedings of the 15th International Workshop on Fast Software Encryption, FSE 2008, ...
WeiterlesenFast Track to MDX gives you all the necessary background to let you to write useful, powerful MDX expressions and introduces ...
WeiterlesenThe sophistication of the underlying cryptographic algorithms, the high complexity of the implementations, and the easy access ...
Weiterlesen