Exploratory data analysis (EDA) is about detecting and describing patterns, trends, and relations in data, motivated by certain ...
Lire la suiteThe book details the vast progress that has been achieved in the understanding of the physical mechanisms of rogue wave phenomenon ...
Lire la suiteDespite the availability of cheap, fast, accurate and usable eye trackers, there is still little information available on ...
Lire la suiteDespite the availability of cheap, fast, accurate and usable eye trackers, there is still little information available on ...
Lire la suiteThis book describes the interdisciplinary work of USAID’s Famine Early Warning System Network (FEWS NET) and its in uence ...
Lire la suiteThe impact of social networks and the influence that fashion influencers have on the choices people make for shopping is ...
Lire la suiteIt addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis ...
Lire la suiteIt addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis ...
Lire la suiteThe Fast Software Encryption 2005 Workshop was the twelfth in a series of annual workshops on symmetric cryptography, sponsored ...
Lire la suiteFast Software Encryption (FSE) 2006 is the 13th in a series of workshops on symmetric cryptography. It has been sponsored ...
Lire la suiteConstitutes the thoroughly refereed proceedings of the 15th International Workshop on Fast Software Encryption, FSE 2008, ...
Lire la suiteThe sophistication of the underlying cryptographic algorithms, the high complexity of the implementations, and the easy access ...
Lire la suiteThis book investigates female employment and the gender gap in the labor market and households during China’s economic ...
Lire la suiteFieldwork for Design looks at why ethnographic approaches have been turned to in the design of computing devices for the ...
Lire la suiteFieldwork for Design looks at why ethnographic approaches have been turned to in the design of computing devices for the ...
Lire la suiteThe scope of This book includes: foundations of computer science; software theory and practice; education; computer applications ...
Lire la suiteThe scope of This book includes: foundations of computer science; software theory and practice; education; computer applications ...
Lire la suiteFilm Art provides the respected scholarship and analytic tools students need to understand key vocabulary and concepts of ...
Lire la suiteConstitutes the post-proceedings of the 5th International Conference on Financial Cryptography held in the British West Indies ...
Lire la suiteThis book cover all aspects of securing transactions and systems, which this year included a range of technical areas such ...
Lire la suite