Electronic Books

Total Books: 621 - 640 /1590
Exploratory Analysis of Spatial and Temporal Data

Exploratory data analysis (EDA) is about detecting and describing patterns, trends, and relations in data, motivated by certain ...

Lee mas
Extreme Ocean Waves

The book details the vast progress that has been achieved in the understanding of the physical mechanisms of rogue wave phenomenon ...

Lee mas
Eye Tracking Methodology: Theory and Practice

Despite the availability of cheap, fast, accurate and usable eye trackers, there is still little information available on ...

Lee mas
Eye Tracking Methodology: Theory and Practice

Despite the availability of cheap, fast, accurate and usable eye trackers, there is still little information available on ...

Lee mas
Famine Early Warning Systems and Remote Sensing Data

This book describes the interdisciplinary work of USAID’s Famine Early Warning System Network (FEWS NET) and its in uence ...

Lee mas
Fashion Recommender Systems / Nima Dokoohaki

The impact of social networks and the influence that fashion influencers have on the choices people make for shopping is ...

Lee mas
Fast Software Encryption

It addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis ...

Lee mas
Fast Software Encryption

It addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis ...

Lee mas
Fast Software Encryption (vol. # 3557)

The Fast Software Encryption 2005 Workshop was the twelfth in a series of annual workshops on symmetric cryptography, sponsored ...

Lee mas
Fast Software Encryption (vol. # 4047)

Fast Software Encryption (FSE) 2006 is the 13th in a series of workshops on symmetric cryptography. It has been sponsored ...

Lee mas
Fast Software Encryption : 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers

Constitutes the thoroughly refereed proceedings of the 15th International Workshop on Fast Software Encryption, FSE 2008, ...

Lee mas
Fault Diagnosis and Tolerance in Cryptography

The sophistication of the underlying cryptographic algorithms, the high complexity of the implementations, and the easy access ...

Lee mas
Female Employment and Gender Gaps in China

This book investigates female employment and the gender gap in the labor market and households during China’s economic ...

Lee mas
Fieldwork for Design

Fieldwork for Design looks at why ethnographic approaches have been turned to in the design of computing devices for the ...

Lee mas
Fieldwork for Design

Fieldwork for Design looks at why ethnographic approaches have been turned to in the design of computing devices for the ...

Lee mas
Fifth World Conference on Information Security Education

The scope of This book includes: foundations of computer science; software theory and practice; education; computer applications ...

Lee mas
Fifth World Conference on Information Security Education

The scope of This book includes: foundations of computer science; software theory and practice; education; computer applications ...

Lee mas
Film Art : An Introduction / David Bordwell, Kristin Thompson, Jeff Smith

Film Art provides the respected scholarship and analytic tools students need to understand key vocabulary and concepts of ...

Lee mas
Financial Cryptography

Constitutes the post-proceedings of the 5th International Conference on Financial Cryptography held in the British West Indies ...

Lee mas
Financial Cryptography and Data Security

This book cover all aspects of securing transactions and systems, which this year included a range of technical areas such ...

Lee mas
Total Books: 621 - 640 /1590