Warning: file_put_contents(cache/omni_b8a7907f56770c49e09c2ca59915cce9.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
The InfoSec Handbook
An Introduction to Information Security...
View Book →The S-matrix of the AdS5 x S5 superstring
In this article we review the world-sheet scattering theory of strings on AdS 5 x S5. The asymptotic spectrum of this world-sheet theory contains both fundamental particles and bound states of the lat...
View Book →The small time asymptotics of the heat kernel at the cut locus
We study the small time asymptotics of the gradient and Hessian of the logarithm of the heat kernel at the cut locus, giving, in principle, complete expansions for both quantities. We relate the leadi...
View Book →
The Huawei and Snowden Questions
Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?...
View Book →
Fundamental Approaches to Software Engineering
21st International Conference, FASE 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings...
View Book →Special Bulletin - International Association of Ice Cream Manufacturers
No description available....
View Book →Mutations Vs. Seiberg duality
For a quiver with potential, Derksen, Weyman and Zelevinsky defined a combinatorial transformation - mutations. Mukhopadhyay and Ray, on the other hand, tell us how to compute Seiberg dual quivers for...
View Book →
Gender Differences in Computer and Information Literacy
An In-depth Analysis of Data from ICILS...
View Book →Nonlinear Transient Thermal Analysis by the Force-Derivative Method
High-speed vehicles such as the Space Shuttle Orbiter must withstand severe aerodynamic heating during reentry through the atmosphere. The Shuttle skin and substructure are constructed primarily of al...
View Book →
S-BPM in the Wild
Practical Value Creation...
View Book →Electronics
June issues, 1941-44 and Nov. issue, 1945, include a buyers' guide section....
View Book →
Building the Infrastructure for Cloud Security
A Solutions view...
View Book →Two results on expected values of imbalance indices of phylogenetic trees
We compute an explicit formula for the expected value of the Colless index of a phylogenetic tree generated under the Yule model, and an explicit formula for the expected value of the Sackin index of ...
View Book →Extensions to the Path Computation Element Communication Protocol (PCEP) to Compute Service-Aware La
In certain networks, such as, but not limited to, financial information networks (e.g., stock market data providers), network performance criteria (e.g., latency) are becoming as critical to data path...
View Book →
Tools and Algorithms for the Construction and Analysis of Systems
25th International Conference, TACAS 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6–11, 2019, Proceedings, Part ...
View Book →
Medical Imaging Systems
An Introductory Guide...
View Book →
The Radiative Decays B -> V gamma at Next-to-Leading Order in QCD
We provide a model-independent framework for the analysis of the radiative B-meson decays B -> K* gamma and B -> rho gamma. In particular, we give a systematic discussion of the various contributions ...
View Book →
Autonomous Control for a Reliable Internet of Services
Methods, Models, Approaches, Techniques, Algorithms, and Tools...
View Book →The SAURON project - VI. Line strength maps of 48 elliptical and lenticular galaxies
We present absorption line strength maps of 48 representative elliptical and lenticular galaxies obtained as part of the SAURON survey of nearby galaxies. Using high-quality spectra, spatially binned ...
View Book →
IEA International Computer and Information Literacy Study 2018 Assessment Framework
...
View Book →
New Horizons for a Data-Driven Economy
A Roadmap for Usage and Exploitation of Big Data in Europe...
View Book →
Security in Computer and Information Sciences
First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...
View Book →
Cloud-Based Benchmarking of Medical Image Analysis
...
View Book →
Signal Computing
Digital Signals in the Software Domain...
View Book →
Computers on the Farm: Farm Uses for Computers, How to Select Software and Hardware, and Online Info
Public domain book available via Project Gutenberg....
View Book →
A Christmas Carol
First published in 1843...
View Book →
The Secret Guide to Computers
Public domain book available via Project Gutenberg....
View Book →
S-BPM Illustrated
A Storybook about Business Process Modeling and Execution...
View Book →
Policy-Oriented Technology Assessment Across Europe: Expanding Capacities
...
View Book →
Haptics: Science, Technology, Applications
12th International Conference, EuroHaptics 2020, Leiden, The Netherlands, September 6–9, 2020, Proceedings...
View Book →
Enabling Things to Talk
Designing IoT solutions with the IoT Architectural Reference Model...
View Book →Graphical and Tabular Methods in Crystallography
No description available....
View Book →
CS Unplugged
An enrichment and extension programme for primary-aged students...
View Book →
High-Performance Modelling and Simulation for Big Data Applications
Selected Results of the COST Action IC1406 cHiPSet...
View Book →On the first k moments of the random count of a pattern in a multi-states sequence generated by a Ma
In this paper, we develop an explicit formula allowing to compute the first k moments of the random count of a pattern in a multi-states sequence generated by a Markov source. We derive efficient algo...
View Book →
Analysis for Computer Scientists
Foundations, Methods, and Algorithms...
View Book →Automorphisms of two-dimensional RAAGs and partially symmetric automorphisms of free groups
We compute the virtual cohomological dimension (VCD) of the group of partially symmetric outer automorphisms of a free group. We use this to obtain new upper and lower bounds on the VCD of the outer a...
View Book →
The Cosmic Computer
Public domain book available via Project Gutenberg....
View Book →
Think Raku (Think Perl 6)
How to Think Like a Computer Scientist...
View Book →
Software for Exascale Computing - SPPEXA 2016-2019
...
View Book →A Note on the Complexity of Computing the Number of Reachable Vertices in a Digraph
In this work, we consider the following problem: given a digraph $G=(V,E)$, for each vertex $v$, we want to compute the number of vertices reachable from $v$. In other words, we want to compute the ou...
View Book →
Platform Embedded Security Technology Revealed
Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...
View Book →
Programming for Computations - Python
A Gentle Introduction to Numerical Simulations with Python...
View Book →
S-BPM in the Production Industry
A Stakeholder Approach...
View Book →
Cyber-Physical Systems of Systems
Foundations – A Conceptual Model and Some Derivations: The AMADEOS Legacy...
View Book →
Google Compute Engine
Learn how to run large-scale, data-intensive workloads with Compute Engine, Google’s cloud platform. Written by Google engineers, this tutorial walks you through the details of this Infrastructure a...
View Book →Tax administration
First published in 1986...
View Book →
The Computers That Made Britain
The home computer revolution of the 1980s...
View Book →Bose-Hubbard model on a star lattice
We analyze the Bose-Hubbard model of hardcore bosons with nearest neighbor hopping and repulsive interactions on a star lattice using both quantum Monte Carlo simulation and dual vortex theory. We obt...
View Book →
Mechanics' and Engineers' Pocketbook of Tables, Rules, and Formulas Pertaining to Mechanics, Mathema
No description available....
View Book →
Sensor Technologies
Healthcare, Wellness, and Environmental Applications...
View Book →
Intel Xeon Phi Coprocessor Architecture and Tools
The Guide for Application Developers...
View Book →
Preparing for Life in a Digital World
IEA International Computer and Information Literacy Study 2018 International Report...
View Book →
Rethinking Productivity in Software Engineering
...
View Book →
The Amazing Journey of Reason
from DNA to Artificial Intelligence...
View Book →NASA Technical Reports Server (NTRS) 20110014293: Detection of Multi-Layer and Vertically-Extended C
The detection of mUltiple cloud layers using satellite observations is important for retrieval algorithms as well as climate applications. In this paper, we describe a relatively simple algorithm to d...
View Book →Thermal property in Brownian motion of a particle coupled to vacuum fluctuations
We investigate Brownian motions of a particle coupled to vacuum fluctuations of a quantum field. The Unruh effect predicts that an observer in an accelerated motion sees the Minkowski vacuum as therma...
View Book →
Raspberry Pi Beginner's Guide
How to use your new computer...
View Book →
Demystifying Internet of Things Security
Successful IoT Device/Edge and Platform Security Deployment...
View Book →
Track and Turnout Engineering
No description available....
View Book →
Intelligent Human Computer Interaction
9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017, Proceedings...
View Book →
Intertwingled
The Work and Influence of Ted Nelson...
View Book →
Automated Machine Learning
Methods, Systems, Challenges...
View Book →
Android on x86
An Introduction to Optimizing for Intel Architecture...
View Book →
Think Java
How to Think Like a Computer Scientist...
View Book →
Preparing for Life in a Digital Age
The IEA International Computer and Information Literacy Study International Report...
View Book →
The Life and Adventures of Nicholas Nickleby
First published in 1800...
View Book →
Informatics in the Future
Proceedings of the 11th European Computer Science Summit (ECSS 2015), Vienna, October 2015...
View Book →
XcalableMP PGAS Programming Language
From Programming Model to Applications...
View Book →
The Haskell School of Music
From Signals to Symphonies...
View Book →
Natural Computing and Beyond
Winter School Hakodate 2011, Hakodate, Japan, March 2011 and 6th International Workshop on Natural Computing, Tokyo, Japan, March 2012, Proceedings...
View Book →Journal
No description available....
View Book →Modern Locomotive Construction
No description available....
View Book →PREDICTING THE SPREAD OF TERRORIST ORGANIZATIONS USING GRAPHS
The U.S. Defense and Intelligence communities expend vast amounts of resources tracking and trying to predict the geographic spread of terrorist groups such as the Islamic State of Iraq and Syria (ISI...
View Book →
How to Think Like a Computer Scientist
Learning with Python...
View Book →
Hacking Secret Ciphers with Python
A beginner's guide to cryptography and computer programming with Python...
View Book →
Theoretical and Practical Advances in Computer-based Educational Measurement
...
View Book →
WebGPU by Examples - Learn and Explore Next-Generation Web Graphics and Compute API
Are you ready to take your web graphics to the next level? Look no further than "WebGPU by Examples". This comprehensive guide equips you with all the tools you need to create stunning 3D graphics in ...
View Book →
Computer and Information Sciences
31st International Symposium, ISCIS 2016, Kraków, Poland, October 27–28, 2016, Proceedings...
View Book →
Computer Networks
First published in 1981...
View Book →
Fundamentals of Business Process Management
...
View Book →The Engineer's Year-book of Formulae, Rules, Tables, Data, and Memoranda in Civil, Mechanical, Elect
No description available....
View Book →Engineer's Year-book of Formulae, Rules, Tables, Data, and Memoranda
No description available....
View Book →
Compute's Quick & Easy Guide to Desktop Publishing
No description available....
View Book →Control Engineering
Instrumentation and automatic control systems....
View Book →
Financial Management
First published in 1987...
View Book →Exercise Manual in Statistics
No description available....
View Book →
Handbook of Vascular Biometrics
...
View Book →
The Autobiography of Benjamin Franklin
First published in 1791...
View Book →Towards a Continuous Record of the Sky
It is currently feasible to start a continuous digital record of the entire sky sensitive to any visual magnitude brighter than 15 each night. Such a record could be created with a modest array of sma...
View Book →IBM Flex System p270 Compute Node Planning and Implementation Guide
To meet today's complex and ever-changing business demands, you need a solid foundation of compute, storage, networking, and software resources that is simple to deploy and can quickly and automatical...
View Book →
Heterotic Line Bundle Standard Models
In a previous publication, arXiv:1106.4804, we have found 200 models from heterotic Calabi-Yau compactifications with line bundles, which lead to standard models after taking appropriate quotients by ...
View Book →
Programming Computer Vision with Python
Tools and algorithms for analyzing images...
View Book →
Ray Tracing Gems
High-Quality and Real-Time Rendering with DXR and Other APIs...
View Book →
Raspberry Pi Camera Guide
For Camera Module & High Quality Camera...
View Book →DTIC ADA420447: Realizations of Electromagnetic Pulsed-Beam Wavelets and Applications of Physics-Bas
A solid and rigorous understanding of electromagnetic pulsed beam wavelet (PBW) sources has been established, though more work is needed to compute realizable current sources (eliminating magnetic cha...
View Book →
Java, Java, Java
Object-Oriented Problem Solving...
View Book →
Invent Your Own Computer Games with Python
A beginner's guide to computer programming in Python...
View Book →
The Legend of Sleepy Hollow
First published in 1820...
View Book →Computing the rho-invariants of links via the signature of colored links with applications to the li
We use a link invariant defined by Cimasoni-Florens to compute \rho-invariants. This generalizes results of Cochran-Teichner and Friedl on knots to the setting of links. As an application, we prove wi...
View Book →
CyberParks – The Interface Between People, Places and Technology
New Approaches and Perspectives...
View Book →
Internet of Things
Information Processing in an Increasingly Connected World...
View Book →
Retro Gaming with Raspberry Pi
...
View Book →
Multiple-Aspect Analysis of Semantic Trajectories
First International Workshop, MASTER 2019, Held in Conjunction with ECML-PKDD 2019, Würzburg, Germany, September 16, 2019, Proceedings...
View Book →Journal of the Senate of the Commonwealth of Pennsylvania
No description available....
View Book →
META-NET Strategic Research Agenda for Multilingual Europe 2020
...
View Book →
Gaming Rhythms
Play and Counterplay from the Situated to the Global...
View Book →
Intel Galileo and Intel Galileo Gen 2
API Features and Arduino Projects for Linux Programmers...
View Book →
Rethinking the Internet of Things
A Scalable Approach to Connecting Everything...
View Book →State Course of Study for Rural Schools of Montana ... 1923
No description available....
View Book →
On-Line Data-Acquisition Systems in Nuclear Physics, 1969
Public domain book available via Project Gutenberg....
View Book →
Model-Based Demography
Essays on Integrating Data, Technique and Theory...
View Book →
Hackers, Heroes of the Computer Revolution. Chapters 1 and 2
Public domain book available via Project Gutenberg....
View Book →
Reconfigurable Processor Array A Bit Sliced Parallel Computer (USA)
First published in 1986...
View Book →
Computers—the machines we think with
Public domain book available via Project Gutenberg....
View Book →
Foundations of Software Science and Computation Structures
21st International Conference, FOSSACS 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14–20, 2018. Proceedings...
View Book →
Enhanced Living Environments
Algorithms, Architectures, Platforms, and Systems...
View Book →
Computation and the Humanities
Towards an Oral History of Digital Humanities...
View Book →
Blown to Bits
Your Life, Liberty, and Happiness After the Digital Explosion...
View Book →
Programming Languages and Systems
27th European Symposium on Programming, ESOP 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings...
View Book →
NASA Technical Reports Server (NTRS) 20080012682: Low-Thrust Control of a Lunar Mapping Orbit
A method is presented for generating and maintaining a lunar mapping orbit using continuous low-thrust hardware. Optimal control theory is used to maintain a lunar orbit that is low-altitude, near-pol...
View Book →Financial audit
First published in 1943...
View Book →
Advances in Computers, Volume 49 (Advances in Computers)
First published in 1995...
View Book →
Programming for Computations - MATLAB/Octave
A Gentle Introduction to Numerical Simulations with MATLAB/Octave...
View Book →
Computer Aided Verification
31st International Conference, CAV 2019, New York City, NY, USA, July 15-18, 2019, Proceedings, Part I...
View Book →