This handbook couples the difficult, critical-thinking aspects of mathematical modeling with the hot area of discrete optimization. ...
Continue readingProvides a new, global, updated, thorough, clear and practical risk-based approach to tunnelling design and construction ...
Continue reading
The purpose of this book is to explain how to build and use insect collecting and rearing devices and through explanations ...
Continue reading
This book gives a detail description of the handover issues in DVB-H networks, in converged DVB-H/UMTS networks and in hybrid ...
Continue reading
Java design patterns are reusable and proven solutions to software design problems. This book covers over 60 battle-tested ...
Continue reading
Starts with the fundamentals of architecture and takes you through the basic components of application architecture. You'll ...
Continue reading
Begins with an overview of the technology landscape behind BERT. It takes you through the basics of NLP, including natural ...
Continue reading
This volume provides an excellent overview of haploid induction and the application of doubled haploids. The authors emphasize ...
Continue reading
This book constitutes the refereed proceedings of the Second International Workshop on Haptic and Audio Interaction Design, ...
Continue reading
Overview The International Workshop on Haptic and Audio Interaction Design was - ganized as part of the EPSRC-funded MultiVis ...
Continue reading
This book constitutes the refereed proceedings of the Third International Workshop on Haptic and Audio Interaction Design, ...
Continue reading
This book constitutes the refereed proceedings of the 6th International Conference on Human Haptic Sensing and Touch Enabled ...
Continue reading
“Hardening” is the process of protecting a system and its applications against unknown threats. Hardening Linux identifies ...
Continue reading
Hardening is the process of protecting a system against unknown threats. System administrators harden against that which ...
Continue reading
Verification is increasingly complex, and SystemVerilog is one of the languages that the verification community is turning ...
Continue reading
The Haifa Verification Conference 2006 took place for the second year in a row at the IBM Haifa Research Lab and at the Haifa ...
Continue reading
The First Haifa Verification Conference was held at the IBM Haifa Research Lab and at the Haifa University in Israel from ...
Continue reading
These are the conference proceedings of the 4th Haifa Verifcation Conference, held October 27–30, 2008 in Haifa, Israel. ...
Continue reading
John J. Benedetto has had a profound influence not only on the direction of harmonic analysis and its applications, but also ...
Continue reading
John J. Benedetto has had a profound influence not only on the direction of harmonic analysis and its applications, but also ...
Continue reading