Warning: file_put_contents(cache/omni_c9e5a379934bf9b458db2bc44b206846.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Software for Exascale Computing - SPPEXA 2016-2019
...
View Book →
META-NET Strategic Research Agenda for Multilingual Europe 2020
...
View Book →
Analysis for Computer Scientists
Foundations, Methods, and Algorithms...
View Book →Learn Android app development
xxviii, 520 p. : 24 cm...
View Book →
Observing the Volcano World
Volcano Crisis Communication...
View Book →
Language Technologies for the Challenges of the Digital Age
27th International Conference, GSCL 2017, Berlin, Germany, September 13-14, 2017, Proceedings...
View Book →
Hybrid-parallel sparse matrix-vector multiplication with explicit communication overlap on current m
We evaluate optimized parallel sparse matrix-vector operations for several representative application areas on widespread multicore-based cluster configurations. First the single-socket baseline perfo...
View Book →Intracellular Delivery of Short Interfering RNA in Rat Organ of Corti Using a Cell-penetrating Pepti
This article is from Molecular Therapy. Nucleic Acids , volume 1 . Abstract RNA interference (RNAi) using short interfering RNA (siRNA) is an attractive therapeutic approach for treatment of dominant-...
View Book →
Purpose-driven Organizations
Management Ideas for a Better World...
View Book →
Rational Cybersecurity for Business
The Security Leaders' Guide to Business Alignment...
View Book →
Russia's Turn to the East
Domestic Policymaking and Regional Cooperation...
View Book →
Intelligent Human Computer Interaction
9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017, Proceedings...
View Book →
Communicative Figurations
Transforming Communications in Times of Deep Mediatization...
View Book →
Transmedial Narration
Narratives and Stories in Different Media...
View Book →
Rethinking the Internet of Things
A Scalable Approach to Connecting Everything...
View Book →
Enhanced Living Environments
Algorithms, Architectures, Platforms, and Systems...
View Book →
Uses of Technology in Lower Secondary Mathematics Education
A Concise Topical Survey...
View Book →
Finite Difference Computing with PDEs
A Modern Software Approach...
View Book →
Open Source Systems: Towards Robust Practices
13th IFIP WG 2.13 International Conference, OSS 2017, Buenos Aires, Argentina, May 22-23, 2017, Proceedings...
View Book →
Interdisciplinary Insights for Digital Touch Communication
...
View Book →CIA Reading Room cia-rdp79b00873a001900010036-5: SEVENTH NATIONAL SYMPOSIUM ON INFORMATION DISPLAY
Declassified in Part - Sanitized Copy Approved for Release 2012/09/06: CIA-RDP79B00873A001900010036-5) IvILIvIlJ111-1111JUM a6 al_ it: Prza-k E) Declassified in Part - Sanitized Copy Approved for Rele...
View Book →
Further restrictions on the topology of stationary black holes in five dimensions
We place further restriction on the possible topology of stationary asymptotically flat vacuum black holes in 5 spacetime dimensions. We prove that the horizon manifold can be either a connected sum o...
View Book →
Interpersonal Communication
...
View Book →
DTIC ADA129825: 2400- TO 800-B/S LPC (Linear Predictive Coder) Rate Converter.
This report presents a means for achieving an 800-bits per second (b/s) speech communication capability by redigitizing the linear predictive coefficients present in the 2400-b/s data stream produced ...
View Book →
Papua New Guinea
Government, Economy and Society...
View Book →
Autonomous Control for a Reliable Internet of Services
Methods, Models, Approaches, Techniques, Algorithms, and Tools...
View Book →
Trade Unions on YouTube
Online Revitalization in Sweden...
View Book →
Community-Oriented Policing and Technological Innovations
...
View Book →
Variant Construction from Theoretical Foundation to Applications
...
View Book →
Clinical Text Mining
Secondary Use of Electronic Patient Records...
View Book →
High-Performance Modelling and Simulation for Big Data Applications
Selected Results of the COST Action IC1406 cHiPSet...
View Book →
The InfoSec Handbook
An Introduction to Information Security...
View Book →
Cyber-Physical Systems of Systems
Foundations – A Conceptual Model and Some Derivations: The AMADEOS Legacy...
View Book →Integrating the Gradient of the Thin Wire Kernel
A formulation for integrating the gradient of the thin wire kernel is presented. This approach employs a new expression for the gradient of the thin wire kernel derived from a recent technique for num...
View Book →
Risk Communication for the Future
Towards Smart Risk Governance and Safety Management...
View Book →
European E-Democracy in Practice
...
View Book →
eIoT
The Development of the Energy Internet of Things in Energy Infrastructure...
View Book →
Intel Xeon Phi Coprocessor Architecture and Tools
The Guide for Application Developers...
View Book →
Dynamic Spectrum Management
From Cognitive Radio to Blockchain and Artificial Intelligence...
View Book →IEEE Southeastcon '99 : proceedings : technology on the brink of 2000 ... : March 25-28, 1999, Hyatt
xiii, 341 pages : 28 cm...
View Book →
Communication and Bioethics at the End of Life
Real Cases, Real Dilemmas...
View Book →
Foundations of Quantum Theory
From Classical Concepts to Operator Algebras...
View Book →
Opening Science
The Evolving Guide on How the Internet is Changing Research, Collaboration and Scholarly Publishing...
View Book →
Cross-Media Communications
An Introduction to the Art of Creating Integrated Media Experiences...
View Book →
97 Things Every Software Architect Should Know
Collective Wisdom from the Experts...
View Book →
New Frontiers in Social Innovation Research
...
View Book →
Simplified Signs, Volume 1
A Manual Sign-Communication System for Special Populations...
View Book →Exploring COVID-19 vaccine sentiment: a Twitter-based analysis of text processing and machine learni
In the wake of the 2020 coronavirus disease (COVID-19) pandemic, the swift development and deployment of vaccines marked a critical juncture, necessitating an understanding of public sentiments for ef...
View Book →
Impact of Information Society Research in the Global South
...
View Book →
Communicating Science
A Global Perspective...
View Book →
Efficient Learning Machines
Theories, Concepts, and Applications for Engineers and System Designers...
View Book →
Secret Key Agreement from Vector Gaussian Sources by Rate Limited Public Communication
We investigate the secret key agreement from correlated vector Gaussian sources in which the legitimate parties can use the public communication with limited rate. For the class of protocols with the ...
View Book →
Communicating, Networking: Interacting
The International Year of Global Understanding - IYGU...
View Book →
Technologies for Development
From Innovation to Social Impact...
View Book →
Sensitivity Analysis: Matrix Methods in Demography and Ecology
...
View Book →
Advanced Professional Communication
A Principled Approach to Workplace Writing...
View Book →
NASA Technical Reports Server (NTRS) 19990063892: Carrier Estimation Using Classic Spectral Estimati
In any satellite communication, the Doppler shift associated with the satellite's position and velocity must be calculated in order to determine the carrier frequency. If the satellite state vector is...
View Book →Detecting attacks on e-mail
E-mail has become a popular communication tool widely used by universities, enterprises and governments. Despite the convenience it brought to people, attacks on e-mail happen very frequently in the r...
View Book →NASA Technical Reports Server (NTRS) 19940031054: A new presentation of complex voltage data for Gol
A presentation method similar to a vector field display or a data-based grid has been used to visualize complex voltage test data taken over multiple subchannels. Unlike simple plots of all data point...
View Book →
The Emigrant Communities of Latvia
National Identity, Transnational Belonging, and Diaspora Politics...
View Book →
S-BPM Illustrated
A Storybook about Business Process Modeling and Execution...
View Book →
Bayesian Methods in the Search for MH370
...
View Book →
Environmental Governance of the Baltic Sea
...
View Book →
Security in Computer and Information Sciences
First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...
View Book →Communication with Disturbance Constraints
Motivated by the broadcast view of the interference channel, the new problem of communication with disturbance constraints is formulated. The rate-disturbance region is established for the single cons...
View Book →
Interface Oral Health Science 2016
Innovative Research on Biosis–Abiosis Intelligent Interface...
View Book →
Understanding Machine Learning
From Theory to Algorithms...
View Book →
Optimizing HPC Applications with Intel Cluster Tools
Hunting Petaflops...
View Book →Journalism and human rights : how demographics drive media coverage
xvi, 165 pages ; 26 cm...
View Book →Continuous Matrix Approximation on Distributed Data
Tracking and approximating data matrices in streaming fashion is a fundamental challenge. The problem requires more care and attention when data comes from multiple distributed sites, each receiving a...
View Book →
Internet of Things
Information Processing in an Increasingly Connected World...
View Book →DTIC ADA075291: Books without Pages,
Computer Graphics has been a vector oriented high technology for interaction and its images have been those of a silent movie. Current trends toward raster scan in general are bringing together the pr...
View Book →
Optics in Our Time
...
View Book →
Gender Differences in Computer and Information Literacy
An In-depth Analysis of Data from ICILS...
View Book →
CyberParks – The Interface Between People, Places and Technology
New Approaches and Perspectives...
View Book →
Pro TBB
C++ Parallel Programming with Threading Building Blocks...
View Book →Vector Broadcast Channels: Optimality of Threshold Feedback Policies
Beamforming techniques utilizing only partial channel state information (CSI) has gained popularity over other communication strategies requiring perfect CSI thanks to their lower feedback requirement...
View Book →
mHealth Innovation in Asia
Grassroots Challenges and Practical Interventions...
View Book →Ordinary Level Physics 2nd edition 1974 reprint by Arthur Frederick Abbott b1909 [1969] {530--oclc}
scan of book Ordinary Level Physics 2nd edition 1974 reprint by Arthur Frederick Abbott b1909 [1969] {530--oclc} Content:- Mechanics and hydrostatics Measurments: What is physics? Nature of phsyical k...
View Book →
Signal Computing
Digital Signals in the Software Domain...
View Book →
Data Parallel C++
Mastering DPC++ for Programming of Heterogeneous Systems using C++ and SYCL...
View Book →
Foundations of Machine Learning
...
View Book →
Error-Correction Coding and Decoding
Bounds, Codes, Decoders, Analysis and Applications...
View Book →
Biodiversity and Health in the Face of Climate Change
...
View Book →GRS - Gesture based Recognition System for Indian Sign Language Recognition System for Deaf and Dumb
Recognition languages are developed for the better communication of the challenged people. The recognition signs include the combination of various with hand gestures, movement, arms and facial expres...
View Book →
Optimizing software in C++
An optimization guide for Windows, Linux and Mac platforms...
View Book →
Physical (A)Causality
Determinism, Randomness and Uncaused Events...
View Book →
Linear Selection Indices in Modern Plant Breeding
...
View Book →