Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...
Lire la suiteCryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...
Lire la suiteWhat is a proof for? What is the characteristic use of a proof as a computation, as opposed to its use as an experiment? ...
Lire la suiteDeep Brain Stimulation in Neurological and Psychiatric Disorders discusses today’s most current and cutting-edge applications ...
Lire la suiteThe benefits of reading this book are twofold. The first is an understanding of the stages of a new product development process ...
Lire la suiteDeep Impact, or at least part of the flight system, is designed to crash into comet 9P/Tempel 1. This bold mission design ...
Lire la suiteDiscusses a broad overview of traditional machine learning methods and state-of-the-art deep learning practices for hardware ...
Lire la suiteYou’ll learn how to configure PyTorch Lightning on a cloud platform, understand the architectural components, and explore ...
Lire la suiteProvides an overview of different deep learning-based methods for face recognition and related problems. Specifically, the ...
Lire la suiteThis second edition includes an entirely new chapter on holographic message plaques for future interstellar probes – a ...
Lire la suiteConstitutes the refereed post-proceedings of the First International Workshop on Deep Structure, Singularities, and Computer ...
Lire la suiteMachine learning and deep learning, as we know, have started ruling over almost every field in the computing industry and ...
Lire la suiteBuild your own pipeline based on modern TensorFlow approaches rather than outdated engineering concepts. This book shows ...
Lire la suiteProvides a useful overview of various aspects of deep-water coral reefs and carbonate mounds, providing insights into the ...
Lire la suiteThe technology used to create such digital content has quickly become accessible to the masses, such as “DEEPFAKE.” Deep ...
Lire la suiteRecently, various techniques of manipulating the video content have become available to everyone – online, one can find ...
Lire la suiteFailures of nano-metric technologies owing to defects and shrinking process tolerances give rise to significant challenges ...
Lire la suiteOne of the key obstacles to high-k integration into Si nano-technology are the electronic defects in high-k materials. It ...
Lire la suiteThis book constitutes the thoroughly refereed post-proceedings of the International Workshop on Defence Applications of Multi-Agent ...
Lire la suiteIn this book defense and security related applications are increasingly being tackled by researchers and practioners using ...
Lire la suite