Warning: file_put_contents(cache/omni_abef97cb39e6c804e97ca2f07db6be03.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Foundations of Machine Learning
...
View Book →
Market Segmentation Analysis
Understanding It, Doing It, and Making It Useful...
View Book →
Grokking Algorithms: An illustrated guide for programmers and other curious people
First published in 2016...
View Book →
Foundations of Software Science and Computation Structures
22nd International Conference, FOSSACS 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6–11, 2019, Proceedings...
View Book →
Intelligent Human Computer Interaction
9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017, Proceedings...
View Book →
A Graduate Course in Applied Cryptography
The indispensable tool used to protect information in computing systems...
View Book →Testing and Debugging Techniques for Answer Set Solver Development
This paper develops automated testing and debugging techniques for answer set solver development. We describe a flexible grammar-based black-box ASP fuzz testing tool which is able to reveal various d...
View Book →
Dynamic 3-Coloring of Claw-free Graphs
A {\it dynamic $k$-coloring} of a graph $G$ is a proper $k$-coloring of the vertices of $G$ such that every vertex of degree at least 2 in $G$ will be adjacent to vertices with at least 2 different co...
View Book →
Joint Source Selection and Data Extrapolation in Social Sensing for Disaster Response
This paper complements the large body of social sensing literature by developing means for augmenting sensing data with inference results that "fill-in" missing pieces. It specifically explores the sy...
View Book →
Mathematical Logic and Its Applications 2020
...
View Book →
Analysis for Computer Scientists
Foundations, Methods, and Algorithms...
View Book →Sampling-based Approximations with Quantitative Performance for the Probabilistic Reach-Avoid Proble
This article deals with stochastic processes endowed with the Markov (memoryless) property and evolving over general (uncountable) state spaces. The models further depend on a non-deterministic quanti...
View Book →
Rhetorical Code Studies
Discovering Arguments in and around Code...
View Book →
Efficient Learning Machines
Theories, Concepts, and Applications for Engineers and System Designers...
View Book →
Algorithms to Live By
First published in 2016...
View Book →
Graph Algorithms
Practical Examples in Apache Spark and Neo4j...
View Book →
Platform Embedded Security Technology Revealed
Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...
View Book →
Problem Solving with Algorithms and Data Structures
...
View Book →
Bounded Degree Planar Geometric Spanners
Given a set $P$ of $n$ points in the plane, we show how to compute in $O(n \log n)$ time a subgraph of their Delaunay triangulation that has maximum degree 7 and is a strong planar $t$-spanner of $P$ ...
View Book →
Ray Tracing Gems
High-Quality and Real-Time Rendering with DXR and Other APIs...
View Book →
Advances in Energy System Optimization
Proceedings of the 2nd International Symposium on Energy System Optimization...
View Book →
Machine Learning for Cyber Physical Systems
Selected papers from the International Conference ML4CPS 2020...
View Book →
Foundations of Trusted Autonomy
...
View Book →
Fundamental Approaches to Software Engineering
21st International Conference, FASE 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings...
View Book →
Solving PDEs in Python
The FEniCS Tutorial I...
View Book →
Finite Difference Computing with Exponential Decay Models
...
View Book →
IMPROVE - Innovative Modelling Approaches for Production Systems to Raise Validatable Efficiency
Intelligent Methods for the Factory of the Future...
View Book →
Introduction to Embedded Systems
A Cyber-Physical Systems Approach...
View Book →
The Art of SEO
Mastering Search Engine Optimization...
View Book →
Programming for Computations - MATLAB/Octave
A Gentle Introduction to Numerical Simulations with MATLAB/Octave...
View Book →
Data structures and algorithm analysis in C
First published in 1993...
View Book →
Programming for Computations - Python
A Gentle Introduction to Numerical Simulations with Python...
View Book →
Data Structures and Algorithms Made Easy
First published in 2011...
View Book →
Graph Databases
New Opportunities for Connected Data...
View Book →
Physical (A)Causality
Determinism, Randomness and Uncaused Events...
View Book →
Minimal-memory realization of pearl-necklace encoders of general quantum convolutional codes
Quantum convolutional codes, like their classical counterparts, promise to offer higher error correction performance than block codes of equivalent encoding complexity, and are expected to find import...
View Book →
Enhanced Living Environments
Algorithms, Architectures, Platforms, and Systems...
View Book →
A Practical Guide to TPM 2.0
Using the New Trusted Platform Module in the New Age of Security...
View Book →
2D Game Development: From Zero to Hero
A compendium of the community knowledge on game design and development...
View Book →
The Future of Financial Systems in the Digital Age
Perspectives from Europe and Japan...
View Book →The lower central series of a right-angled Artin group
We give a description of Duchamp and Krob's extension of Magnus' approach to the lower central series of the free group to right-angled Artin groups. We also describe how Lalonde's extension of Lyndon...
View Book →
Computer Aided Verification
31st International Conference, CAV 2019, New York City, NY, USA, July 15-18, 2019, Proceedings, Part I...
View Book →
Computer and Information Sciences
31st International Symposium, ISCIS 2016, Kraków, Poland, October 27–28, 2016, Proceedings...
View Book →Minimum-Link Paths Revisited
A path or a polygonal domain is C-oriented if the orientations of its edges belong to a set of C given orientations; this is a generalization of the notable rectilinear case (C = 2). We study exact an...
View Book →Explicit correlation amplifiers for finding outlier correlations in deterministic subquadratic time
We derandomize G. Valiant's [J. ACM 62 (2015) Art. 13] subquadratic-time algorithm for finding outlier correlations in binary data. Our derandomized algorithm gives deterministic subquadratic scaling ...
View Book →Ballistic missile tracking using the interacting multiple model joint probabilistic data association
The success of interceptors used by the United States ballistic missile defense program is jeopardized by the use of hostile missile decoy deployment and evasive maneuvers. The ability to discriminate...
View Book →
Machine Learning Yearning
Technical Strategy for AI Engineers, In the Era of Deep Learning...
View Book →
Annotated Algorithms in Python
With applications in Physics, Biology, and Finance...
View Book →
Cloud-Based Benchmarking of Medical Image Analysis
...
View Book →
Think Data Structures
Algorithms and Information Retrieval in Java...
View Book →
Pro TBB
C++ Parallel Programming with Threading Building Blocks...
View Book →
High-Performance Modelling and Simulation for Big Data Applications
Selected Results of the COST Action IC1406 cHiPSet...
View Book →The Synthesis and Analysis of Stochastic Switching Circuits
Stochastic switching circuits are relay circuits that consist of stochastic switches called pswitches. The study of stochastic switching circuits has widespread applications in many fields of computer...
View Book →
Optimization of Process Flowsheets through Metaheuristic Techniques
...
View Book →
Teaching Multiplication with Lesson Study
Japanese and Ibero-American Theories for Mathematics Education...
View Book →Graded Projected Entangled-Pair State Representations and An Algorithm for Translationally Invariant
Available on Internet Archive....
View Book →
Digital signal processing
First published in 1992...
View Book →
Algorithmic Graph Theory and Sage
...
View Book →2005 Anginal Symptoms Are Not Predictive Of Myocardial Perfusion Or Function In Diabetics
Background: Patients with diabetes are more than twice as likely to die from coronary artery disease than non-diabetics. Deciding which diabetic patients require an aggressive workup, however, is chal...
View Book →
Statistical Learning and Sequential Prediction
...
View Book →
Social Media Mining
An Introduction...
View Book →
Graph Databases For Beginners
The #1 Platform for Connected Data...
View Book →
Autonomous Control for a Reliable Internet of Services
Methods, Models, Approaches, Techniques, Algorithms, and Tools...
View Book →
Finite Difference Computing with PDEs
A Modern Software Approach...
View Book →A Quantum Search Algorithm for a Specified Number of Targets
The quantum search algorithm of Chen and Diao, which finds with certainty a single target item in an unsorted database, is modified so as to be capable of searching for an arbitrary specified number o...
View Book →
Software for Exascale Computing - SPPEXA 2016-2019
...
View Book →
Algorithms for Decision Making
...
View Book →
Clinical Text Mining
Secondary Use of Electronic Patient Records...
View Book →
Natural Computing and Beyond
Winter School Hakodate 2011, Hakodate, Japan, March 2011 and 6th International Workshop on Natural Computing, Tokyo, Japan, March 2012, Proceedings...
View Book →
Understanding Machine Learning
From Theory to Algorithms...
View Book →
Forecasting and Assessing Risk of Individual Electricity Peaks
...
View Book →
Intel Xeon Phi Coprocessor Architecture and Tools
The Guide for Application Developers...
View Book →Adaptive Space-Time Decision Feedback Neural Detectors with Data Selection for High-Data Rate Users
A space-time adaptive decision feedback (DF) receiver using recurrent neural networks (RNN) is proposed for joint equalization and interference suppression in direct-sequence code-division-multiple-ac...
View Book →
International Symposium on Mathematics, Quantum Theory, and Cryptography
Proceedings of MQC 2019...
View Book →
Theory and Applications of Ordered Fuzzy Numbers
A Tribute to Professor Witold Kosiński...
View Book →
Teaching and Learning About Whole Numbers in Primary School
...
View Book →An implementation of the relational k-means algorithm
A C# implementation of a generalized k-means variant called relational k-means is described here. Relational k-means is a generalization of the well-known k-means clustering method which works for non...
View Book →Mascots '96 : 4th International Workshop on Modeling, Analysis and Simulation
1 online resource (312 pages)...
View Book →
Data structures and algorithms
First published in 1983...
View Book →
A CG Method for Multiple Right Hand Sides and Multiple Shifts in Lattice QCD Calculations
We consider the task of computing solutions of linear systems that only differ by a shift with the identity matrix as well as linear systems with several different right hand sides. In the past Krylov...
View Book →
Unstructured Human Activity Detection from RGBD Images
Being able to detect and recognize human activities is essential for several applications, including personal assistive robotics. In this paper, we perform detection and recognition of unstructured hu...
View Book →
Programming Computer Vision with Python
Tools and algorithms for analyzing images...
View Book →
Tools and Algorithms for the Construction and Analysis of Systems
25th International Conference, TACAS 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6–11, 2019, Proceedings, Part ...
View Book →
CS Unplugged
An enrichment and extension programme for primary-aged students...
View Book →
Introduction to Algorithms
First published in 1990...
View Book →
Automated Machine Learning
Methods, Systems, Challenges...
View Book →
Projection-Based Clustering through Self-Organization and Swarm Intelligence
Combining Cluster Analysis with the Visualization of High-Dimensional Data...
View Book →
Error-Correction Coding and Decoding
Bounds, Codes, Decoders, Analysis and Applications...
View Book →
Convex Hull and Linear Programming in Read-only Setup with Limited Work-space
Prune-and-search is an important paradigm for solving many important geometric problems. We show that the general prune-and-search technique can be implemented where the objects are given in read-only...
View Book →
Lithium-Ion Batteries
A Machine-Generated Summary of Current Research...
View Book →
Design Analysis and Algorithms
First published in 2008...
View Book →
Introduction to Data Science
Data Analysis and Prediction Algorithms with R...
View Book →
Tensor Network Contractions
Methods and Applications to Quantum Many-Body Systems...
View Book →