bannerbanner
ЗарубежныеРусскиеВсе

зарубежная компьютерная литература

Elements of Computational Systems Biology
5
Groundbreaking, long-ranging research in this emergent field that enables solutions to complex biological problems Computational systems biology is an emerging discipline that is evolving quickly due to recent advances in biology such as genome seque…
Groundbreaking, long-ranging research in this emergent field that enables solutions to complex biological problems Computational systems biology is an emerging discipline that is evolving quickly due to recent advances in biology such as genome seque…
Phase-Field Methods in Materials Science and Engineering
4
This comprehensive and self-contained, one-stop source discusses phase-field methodology in a fundamental way, explaining advanced numerical techniques for solving phase-field and related continuum-field models. It also presents numerical techniques …
This comprehensive and self-contained, one-stop source discusses phase-field methodology in a fundamental way, explaining advanced numerical techniques for solving phase-field and related continuum-field models. It also presents numerical techniques …
Market-Oriented Grid and Utility Computing
5
The first single-source reference covering the state of the art in grid and utility computing economy research This book presents the first integrated, single-source reference on market-oriented grid and utility computing. Divided into four main part…
The first single-source reference covering the state of the art in grid and utility computing economy research This book presents the first integrated, single-source reference on market-oriented grid and utility computing. Divided into four main part…
Mathematics of Bioinformatics. Theory, Methods and Applications
3
Mathematics of Bioinformatics: Theory, Methods, and Applications provides a comprehensive format for connecting and integrating information derived from mathematical methods and applying it to the understanding of biological sequences, structures, an…
Mathematics of Bioinformatics: Theory, Methods, and Applications provides a comprehensive format for connecting and integrating information derived from mathematical methods and applying it to the understanding of biological sequences, structures, an…
Computer Architecture
5
This book lays out the concepts necessary to understand how a computer works. For reasons of clarity, the authors have deliberately chosen examples that apply to machines from all eras, without having to water down the contents of the book. This choi…
This book lays out the concepts necessary to understand how a computer works. For reasons of clarity, the authors have deliberately chosen examples that apply to machines from all eras, without having to water down the contents of the book. This choi…
Computer Assisted Exercises and Training. A Reference Guide
5
A comprehensive guide to computer assisted exercises Readers can turn to this indispensable reference guide for comprehensive and lucid coverage of the operational, technical, and organizational knowledge needed to harness successful and constructive…
A comprehensive guide to computer assisted exercises Readers can turn to this indispensable reference guide for comprehensive and lucid coverage of the operational, technical, and organizational knowledge needed to harness successful and constructive…
Modeling and Optimization of Air Traffic
3
This book combines the research activities of the authors, both of whom are researchers at Ecole Nationale de l’Aviation Civile (French National School of Civil Aviation), and presents their findings from the last 15 years. Their work uses air transp…
This book combines the research activities of the authors, both of whom are researchers at Ecole Nationale de l’Aviation Civile (French National School of Civil Aviation), and presents their findings from the last 15 years. Their work uses air transp…
Hyperconnectivity. Economical, Social and Environmental Challenges
5
The use of digital information and communication technologies would be the traces of a social acceptability of the exploitation of all data, in the context of negotiations of uses. This is the reason why the users present themselves actors and contri…
The use of digital information and communication technologies would be the traces of a social acceptability of the exploitation of all data, in the context of negotiations of uses. This is the reason why the users present themselves actors and contri…
Insider Threats
4
An information system may be regarded as an organized set of resources, both technological and human. Security should take this specificity into consideration in order to ensure an overall security of information systems. The security of information …
An information system may be regarded as an organized set of resources, both technological and human. Security should take this specificity into consideration in order to ensure an overall security of information systems. The security of information …
Enterprise Interoperability: Smart Services and Business Impact of Enterprise Interoperability
5
The ability of future industry to create interactive, flexible and always-on connections between design, manufacturing and supply is an ongoing challenge, affecting competitiveness, efficiency and resourcing. The goal of enterprise interoperability (…
The ability of future industry to create interactive, flexible and always-on connections between design, manufacturing and supply is an ongoing challenge, affecting competitiveness, efficiency and resourcing. The goal of enterprise interoperability (…
Advanced Computer Architecture and Parallel Processing
4
Computer architecture deals with the physical configuration, logical structure, formats, protocols, and operational sequences for processing data, controlling the configuration, and controlling the operations over a computer. It also encompasses word…
Computer architecture deals with the physical configuration, logical structure, formats, protocols, and operational sequences for processing data, controlling the configuration, and controlling the operations over a computer. It also encompasses word…
Computational Intelligence and Feature Selection
4
The rough and fuzzy set approaches presented here open up many new frontiers for continued research and development Computational Intelligence and Feature Selection provides readers with the background and fundamental ideas behind Feature Selection (…
The rough and fuzzy set approaches presented here open up many new frontiers for continued research and development Computational Intelligence and Feature Selection provides readers with the background and fundamental ideas behind Feature Selection (…
An Introduction to Communication Network Analysis
3
This book is a quantitative text, which focuses on the real issues behind serious modeling and analysis of communications networks. The author covers all the necessary mathematics and theory in order for students to understand the tools that optimize…
This book is a quantitative text, which focuses on the real issues behind serious modeling and analysis of communications networks. The author covers all the necessary mathematics and theory in order for students to understand the tools that optimize…
Digital Humanities
4
Where do the digital humanities really come from? Are they really news? What are the theoretical and technical influences that participate in this scientific field that arouses interest and questions? This book tries to show and explain the main theo…
Where do the digital humanities really come from? Are they really news? What are the theoretical and technical influences that participate in this scientific field that arouses interest and questions? This book tries to show and explain the main theo…
Traceable Human Experiment Design Research
5
The aim of this book is to describe the methodology of conducting the THEDRE research «Traceable Human Experiment Design Research». It applies to Research in Human Centered Informatics (RICH). These are areas of computer research that integrate users…
The aim of this book is to describe the methodology of conducting the THEDRE research «Traceable Human Experiment Design Research». It applies to Research in Human Centered Informatics (RICH). These are areas of computer research that integrate users…
Micro, Nanosystems and Systems on Chips
3
Micro and nanosystems represent a major scientific and technological challenge, with actual and potential applications in almost all fields of the human activity. The aim of the present book is to present how concepts from dynamical control systems (…
Micro and nanosystems represent a major scientific and technological challenge, with actual and potential applications in almost all fields of the human activity. The aim of the present book is to present how concepts from dynamical control systems (…
Data Mining the Web
5
This book introduces the reader to methods of data mining on the web, including uncovering patterns in web content (classification, clustering, language processing), structure (graphs, hubs, metrics), and usage (modeling, sequence analysis, performan…
This book introduces the reader to methods of data mining on the web, including uncovering patterns in web content (classification, clustering, language processing), structure (graphs, hubs, metrics), and usage (modeling, sequence analysis, performan…
Data Warehousing Fundamentals
4
Geared to IT professionals eager to get into the all-important field of data warehousing, this book explores all topics needed by those who design and implement data warehouses. Readers will learn about planning requirements, architecture, infrastruc…
Geared to IT professionals eager to get into the all-important field of data warehousing, this book explores all topics needed by those who design and implement data warehouses. Readers will learn about planning requirements, architecture, infrastruc…
Ecosystems Knowledge
4
To analyze complex situations we use everyday analogies that allow us to invest in an unknown domain knowledge we have acquired in a known field. In this work the author proposes a modeling and analysis method that uses the analogy of the ecosystem t…
To analyze complex situations we use everyday analogies that allow us to invest in an unknown domain knowledge we have acquired in a known field. In this work the author proposes a modeling and analysis method that uses the analogy of the ecosystem t…
Network Security
4
A unique overview of network security issues, solutions, and methodologies at an architectural and research level Network Security provides the latest research and addresses likely future developments in network security protocols, architectures, pol…
A unique overview of network security issues, solutions, and methodologies at an architectural and research level Network Security provides the latest research and addresses likely future developments in network security protocols, architectures, pol…

Популярные авторы