Warning: file_put_contents(cache/omni_48b1580532594ebcc63f480a91266239.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
CIA Reading Room cia-rdp67b00511r000100160023-9: (UNTITLED)
Approved For Release 2001/03/22 CIA-RDP67BOO511 R000100160023-9 BEST COPY AVAILABLE Approved For Release 2001/03/22 : CIA-RDP67BOO511 R000100160023-9 Approved For Rel a 2001/03/22: CIA-RDP67BO Approve...
View Book →
Cloud-Based Benchmarking of Medical Image Analysis
...
View Book →
XcalableMP PGAS Programming Language
From Programming Model to Applications...
View Book →An improved deep bagging convolutional neural network classifier for efficient intrusion detection s
In the current trend, the network-based system has substantial jobs, and they have become the targets of attackers. When an intrusion occurs, the security of a computer system is compromised. As a res...
View Book →
The Huawei and Snowden Questions
Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?...
View Book →Estimacion de carga muscular mediante imagenes
Un problema de gran interes en disciplinas como la ocupacional, ergonomica y deportiva, es la medicion de variables biomecanicas involucradas en el movimiento humano (como las fuerzas musculares inter...
View Book →Comparing emotion classification: machine learning algorithms and hybrid model with support vector m
Recently, the use of artificial intelligence techniques has become widespread, having been adopted in brain-computer interfaces (BCIs) with electroencephalograms (EEGs). BCIs allow direct communicatio...
View Book →
Retro Gaming with Raspberry Pi
...
View Book →
Intelligent Human Computer Interaction
9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017, Proceedings...
View Book →
Invent Your Own Computer Games with Python
A beginner's guide to computer programming in Python...
View Book →
The Computers That Made Britain
The home computer revolution of the 1980s...
View Book →
Defense against the Black Arts
How Hackers Do What They Do and How to Protect against It...
View Book →
High Performance Computing on Vector Systems 2011
First published in 2011...
View Book →
Programming for Computations - Python
A Gentle Introduction to Numerical Simulations with Python 3.6...
View Book →
Theoretical and Practical Advances in Computer-based Educational Measurement
...
View Book →
Intertwingled
The Work and Influence of Ted Nelson...
View Book →Designing and Developing a Machine Vision System to Predict the Chlorophyll and Carotenoid Content o
Introduction Leaf color is usually used as a guide for assessments of nutrient status and plant health. Most of the existing methods that examined relationships between chlorophyll status and caroteno...
View Book →
Vectorization of computer programs with applications to computational fluid dynamics
First published in 1984...
View Book →
Intel Xeon Phi Coprocessor Architecture and Tools
The Guide for Application Developers...
View Book →
Foundations of Software Science and Computation Structures
21st International Conference, FOSSACS 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14–20, 2018. Proceedings...
View Book →
Haptics: Science, Technology, Applications
12th International Conference, EuroHaptics 2020, Leiden, The Netherlands, September 6–9, 2020, Proceedings...
View Book →
Introduction to Scientific Computing
First published in 1996...
View Book →
Rethinking Productivity in Software Engineering
...
View Book →
Gender Differences in Computer and Information Literacy
An In-depth Analysis of Data from ICILS...
View Book →
Raspberry Pi Camera Guide
For Camera Module & High Quality Camera...
View Book →
Sensor Technologies
Healthcare, Wellness, and Environmental Applications...
View Book →
Analysis for Computer Scientists
Foundations, Methods, and Algorithms...
View Book →Automated generation and symbolic manipulation of tensor product finite elements
We describe and implement a symbolic algebra for scalar and vector-valued finite elements, enabling the computer generation of elements with tensor product structure on quadrilateral, hexahedral and t...
View Book →
The InfoSec Handbook
An Introduction to Information Security...
View Book →
Intel Galileo and Intel Galileo Gen 2
API Features and Arduino Projects for Linux Programmers...
View Book →
How to Think Like a Computer Scientist
Learning with Python...
View Book →
CS Unplugged
An enrichment and extension programme for primary-aged students...
View Book →Graphic display products - Raster Technologies 1981:
Graphic display products - Raster Technologies 1981...
View Book →
The Amazing Journey of Reason
from DNA to Artificial Intelligence...
View Book →
Ray Tracing Gems
High-Quality and Real-Time Rendering with DXR and Other APIs...
View Book →
Gaming Rhythms
Play and Counterplay from the Situated to the Global...
View Book →
Signal Computing
Digital Signals in the Software Domain...
View Book →megatek :: patents :: US4808988 anti-aliased vector patents :: US4222048
From the bitsavers.org collection, a scanned-in computer-related document. megatek :: patents :: US4808988 anti-aliased vector patents :: US4222048...
View Book →
Internet of Things
Information Processing in an Increasingly Connected World...
View Book →
Digital Video Concepts, Methods, and Metrics
Quality, Compression, Performance, and Power Trade-off Analysis...
View Book →NASA Technical Reports Server (NTRS) 19840012158: Modeling material failure with a vectorized routin
The computational aspects of modelling material failure in structural wood members are presented with particular reference to vector processing aspects. Wood members are considered to be highly orthot...
View Book →
Understanding Machine Learning
From Theory to Algorithms...
View Book →
Data Parallel C++
Mastering DPC++ for Programming of Heterogeneous Systems using C++ and SYCL...
View Book →
Efficient Learning Machines
Theories, Concepts, and Applications for Engineers and System Designers...
View Book →
Policy-Oriented Technology Assessment Across Europe: Expanding Capacities
...
View Book →Progress in cryptology--LATINCRYPT 2010 : first International Conference on Cryptology and Informati
1 online resource (xii, 322 pages) :...
View Book →
Blown to Bits
Your Life, Liberty, and Happiness After the Digital Explosion...
View Book →
Architecture of high performance computers
First published in 1982...
View Book →
Autonomous Control for a Reliable Internet of Services
Methods, Models, Approaches, Techniques, Algorithms, and Tools...
View Book →
Vector Analysis for Computer Graphics
First published in 2021...
View Book →
Foundations of Machine Learning
...
View Book →
High Performance Computing On Vector Systems 2008
First published in 2008...
View Book →
Software for Exascale Computing - SPPEXA 2016-2019
...
View Book →Web application security is a stack : how to CYA (Cover Your Apps) completely
1 online resource (71 pages) :...
View Book →
Preparing for Life in a Digital Age
The IEA International Computer and Information Literacy Study International Report...
View Book →
Computer Aided Verification
31st International Conference, CAV 2019, New York City, NY, USA, July 15-18, 2019, Proceedings, Part I...
View Book →
Programming Languages and Systems
27th European Symposium on Programming, ESOP 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings...
View Book →
The Haskell School of Music
From Signals to Symphonies...
View Book →
Computation and the Humanities
Towards an Oral History of Digital Humanities...
View Book →
Think Raku (Think Perl 6)
How to Think Like a Computer Scientist...
View Book →
Deep Spatial Pyramid: The Devil is Once Again in the Details
In this paper we show that by carefully making good choices for various detailed but important factors in a visual recognition framework using deep learning features, one can achieve a simple, efficie...
View Book →
Think Java
How to Think Like a Computer Scientist...
View Book →
Preparing for Life in a Digital World
IEA International Computer and Information Literacy Study 2018 International Report...
View Book →
Optimizing software in C++
An optimization guide for Windows, Linux and Mac platforms...
View Book →
Fundamental Approaches to Software Engineering
21st International Conference, FASE 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings...
View Book →
Programming Computer Vision with Python
Tools and algorithms for analyzing images...
View Book →
Multiple-Aspect Analysis of Semantic Trajectories
First International Workshop, MASTER 2019, Held in Conjunction with ECML-PKDD 2019, Würzburg, Germany, September 16, 2019, Proceedings...
View Book →
Partial differential equations for computational science
First published in 1998...
View Book →
Cyber-Physical Systems of Systems
Foundations – A Conceptual Model and Some Derivations: The AMADEOS Legacy...
View Book →
Handbook of Vascular Biometrics
...
View Book →New approach to the identification of the easy expression recognition system by robust techniques (S
In recent years, facial recognition has been a major problem in the field of computer vision, which has attracted lots of interest in previous years because of its use in different applications by dif...
View Book →dec :: qbus :: EK-DRV1J-UG 002 DRV11J UG
From the bitsavers.org collection, a scanned-in computer-related document. dec :: qbus :: EK-DRV1J-UG 002 DRV11J UG...
View Book →Microcalcification and Macrocalcification Detection in Mammograms Based on GLCM and ODCM Texture Fea
Breast cancer is a common cancer in women and the second leading cause of cancer deaths worldwide. Photographing the changes in internal breast structure due to formation of masses and microcalcificat...
View Book →
Hacking Secret Ciphers with Python
A beginner's guide to cryptography and computer programming with Python...
View Book →
Fundamentals of Business Process Management
...
View Book →
Rethinking the Internet of Things
A Scalable Approach to Connecting Everything...
View Book →Algebraic characterization of simple closed curves via Turaev's cobracket
The vector space $\V$ generated by the conjugacy classes in the fundamental group of an orientable surface has a natural Lie cobracket $\map{\delta}{\V}{\V\times \V}$. For negatively curved surfaces, ...
View Book →
Computer and Information Sciences
31st International Symposium, ISCIS 2016, Kraków, Poland, October 27–28, 2016, Proceedings...
View Book →cdc :: cyber :: lang :: apl :: 60454000F NOS APL Version 2 Nov80
From the bitsavers.org collection, a scanned-in computer-related document. cdc :: cyber :: lang :: apl :: 60454000F NOS APL Version 2 Nov80...
View Book →
Introduction to Parallel and Vector Scientific Computation
First published in 2006...
View Book →
Informatics in the Future
Proceedings of the 11th European Computer Science Summit (ECSS 2015), Vienna, October 2015...
View Book →
Automated Machine Learning
Methods, Systems, Challenges...
View Book →
Raspberry Pi Beginner's Guide
How to use your new computer...
View Book →
International Symposium on Mathematics, Quantum Theory, and Cryptography
Proceedings of MQC 2019...
View Book →
Java, Java, Java
Object-Oriented Problem Solving...
View Book →
Security in Computer and Information Sciences
First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...
View Book →Closed loop control of a cascaded multi-level converter to minimize harmonic distortion
As the United States Navy moves toward the all-electric ship, the need for a robust, high fidelity inverter for propulsion motors becomes mandatory. Military vessels require high power converters capa...
View Book →
CyberParks – The Interface Between People, Places and Technology
New Approaches and Perspectives...
View Book →
Twin Support Vector Machines
First published in 2016...
View Book →
Model-Based Demography
Essays on Integrating Data, Technique and Theory...
View Book →
Enhanced Living Environments
Algorithms, Architectures, Platforms, and Systems...
View Book →
NASA Technical Reports Server (NTRS) 19840012150: Chemical application of diffusion quantum Monte Ca
The diffusion quantum Monte Carlo (QMC) method gives a stochastic solution to the Schroedinger equation. This approach is receiving increasing attention in chemical applications as a result of its hig...
View Book →
Platform Embedded Security Technology Revealed
Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...
View Book →
Scientific computing on vector computers
First published in 1987...
View Book →
IEA International Computer and Information Literacy Study 2018 Assessment Framework
...
View Book →
Developing Graphics Frameworks with Python and OpenGL
...
View Book →
High-Performance Modelling and Simulation for Big Data Applications
Selected Results of the COST Action IC1406 cHiPSet...
View Book →