Warning: file_put_contents(cache/omni_c2b337978bfaa8ed5a670557af27ef6f.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Computational noncommutative algebra and applications
First published in 2004...
View Book →
Theoretical and Practical Advances in Computer-based Educational Measurement
...
View Book →
S-BPM in the Production Industry
A Stakeholder Approach...
View Book →
DevOps for Digital Leaders
Reignite Business with a Modern DevOps-Enabled Software Factory...
View Book →
Intel Xeon Phi Coprocessor Architecture and Tools
The Guide for Application Developers...
View Book →
Rethinking the Internet of Things
A Scalable Approach to Connecting Everything...
View Book →DTIC ADA387275: Digital Mapping, Charting, and Geodesy Analysis Program: Technical Review DLA Electr
One of the functions of the Defense Logistics Agency (DLA) is to provide a supply channel for maps and charts to the DoD users. Currently the user is provided with a set of printed map index sheets th...
View Book →
Enhanced Living Environments
Algorithms, Architectures, Platforms, and Systems...
View Book →
Fundamental Approaches to Software Engineering
21st International Conference, FASE 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings...
View Book →
Computer Aided Verification
31st International Conference, CAV 2019, New York City, NY, USA, July 15-18, 2019, Proceedings, Part I...
View Book →TRS-80 PC-2 Pocket Computer Math Pak I Software Package 26-3709
Math Pak I for the TRS-80 Pocket Computer PC-2 (also Sharp PC-1500). Catalog number 26-3709. (Sorry, I lack humor for a description on this one. It goes so far beyond my comprehension of math subjects...
View Book →
The Huawei and Snowden Questions
Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?...
View Book →
Taking Kubernetes from Test to Production
Improving Resilience, Visibility, and Security with Traffic Management Tools...
View Book →
Analysis for Computer Scientists
Foundations, Methods, and Algorithms...
View Book →
Policy-Oriented Technology Assessment Across Europe: Expanding Capacities
...
View Book →
Intelligent Human Computer Interaction
9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017, Proceedings...
View Book →
Finding the Limits of the Limes
Modelling Demography, Economy and Transport on the Edge of the Roman Empire...
View Book →
XcalableMP PGAS Programming Language
From Programming Model to Applications...
View Book →qualstar :: patents :: pat4893312
From the bitsavers.org collection, a scanned-in computer-related document. qualstar :: patents :: pat4893312...
View Book →
Designing Sustainable Energy for All
Sustainable Product-Service System Design Applied to Distributed Renewable Energy...
View Book →CIA Reading Room cia-rdp86t00589r000300340003-5: ARGENTINA: DEFENSE INDUSTRIES IN TRANSITION
AI-L 25X1 Declassified in Part - Sanitized Copy Approved for Release 2011/12/21: CIA-RDP86T00589R000300340003-5 Declassified in Part - Sanitized Copy Approved for Release 2011/12/21: CIA-RDP86T00589R0...
View Book →
The Haskell School of Music
From Signals to Symphonies...
View Book →
Platform Embedded Security Technology Revealed
Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...
View Book →ZnO bao mo zhi bei ji qi guang, dian xing neng yan jiu
First published in 2010...
View Book →
CyberParks – The Interface Between People, Places and Technology
New Approaches and Perspectives...
View Book →
Netspam: An Efficient Approach to Prevent Spam Messages using Support Vector Machine
The most common mode for consumers to express their level of satisfaction with their purchases is through online ratings, which we can refer as Online Review System. Network analysis has recently gain...
View Book →
Computer and Information Sciences
31st International Symposium, ISCIS 2016, Kraków, Poland, October 27–28, 2016, Proceedings...
View Book →CIA Reading Room cia-rdp91b00060r000100130034-4: OIT STANDARD FOR GRAPHICS INTERCHANGE
Declassified in Part - Sanitized Copy Approved for Release 2013/07/31 : CIA-RDP91B00060R000100130034-4 STAT ROUTING AND RECORD SHEET SUBJECT: (Optional) OIT Standard for Graphics Interchange Edward J....
View Book →ibm :: 1620 :: general program library :: 5.0.002 Simultaneous Equation Solution - Revised
From the bitsavers.org collection, a scanned-in computer-related document. ibm :: 1620 :: general program library :: 5.0.002 Simultaneous Equation Solution - Revised...
View Book →
Lightweight Systems for Realtime Monitoring
Tools to unlock and understand your business data...
View Book →
Scaling a Software Business
The Digitalization Journey...
View Book →
Aquaponics Food Production Systems
Combined Aquaculture and Hydroponic Production Technologies for the Future...
View Book →
Creating a Production Launch Plan
For a Successful Launch, Planning Isn't Optional...
View Book →
Software & Hardware Collide
The Best of Solid...
View Book →
The Privacy Engineer's Manifesto
Getting from Policy to Code to QA to Value...
View Book →
Preparing for Life in a Digital World
IEA International Computer and Information Literacy Study 2018 International Report...
View Book →
S-BPM in the Wild
Practical Value Creation...
View Book →
Contextual Process Digitalization
Changing Perspectives – Design Thinking – Value-Led Design...
View Book →
Multiple-Aspect Analysis of Semantic Trajectories
First International Workshop, MASTER 2019, Held in Conjunction with ECML-PKDD 2019, Würzburg, Germany, September 16, 2019, Proceedings...
View Book →
Supervised multiview learning based on simultaneous learning of multiview intact and single view cla
Multiview learning problem refers to the problem of learning a classifier from multiple view data. In this data set, each data points is presented by multiple different views. In this paper, we propos...
View Book →
IEA International Computer and Information Literacy Study 2018 Assessment Framework
...
View Book →
Preparing for Life in a Digital Age
The IEA International Computer and Information Literacy Study International Report...
View Book →
Internet of Things
Information Processing in an Increasingly Connected World...
View Book →DTIC ADA339206: Architectural Implications of a Family of Irregular Applications
Irregular applications based on sparse matrices are at the core of many important scientific computations. Since the importance of such applications is likely to increase in the future, high-performan...
View Book →
High-Performance Modelling and Simulation for Big Data Applications
Selected Results of the COST Action IC1406 cHiPSet...
View Book →
The Amazing Journey of Reason
from DNA to Artificial Intelligence...
View Book →
DTIC ADA1012143: Analysis of 'Dot Product Space' Shape Descriptions,
A convenient representation for blob-like figures in an image consists of the orientation, length, and width of a bounding rectangle. One fast algorithm for producing such a bounding rectangle is base...
View Book →
Programming Computer Vision with Python
Tools and algorithms for analyzing images...
View Book →
Dynamics of Long-Life Assets
From Technology Adaptation to Upgrading the Business Model...
View Book →
Designing Sustainable Technologies, Products and Policies
From Science to Innovation...
View Book →
S-BPM Illustrated
A Storybook about Business Process Modeling and Execution...
View Book →On the Impossibility to Extend Triples of Mutually Unbiased Product Bases in Dimension Six
An analytic proof is given which shows that it is impossible to extend any triple of mutually unbiased (MU) product bases in dimension six by a single MU vector. Furthermore, the 16 states obtained by...
View Book →
Efficient Learning Machines
Theories, Concepts, and Applications for Engineers and System Designers...
View Book →
Inner Product Similarity Search using Compositional Codes
This paper addresses the nearest neighbor search problem under inner product similarity and introduces a compact code-based approach. The idea is to approximate a vector using the composition of sever...
View Book →
Informatics in the Future
Proceedings of the 11th European Computer Science Summit (ECSS 2015), Vienna, October 2015...
View Book →DTIC ADA1012140: Analysis of 'Dot Product Space' Shape Descriptions,
A convenient representation for blob-like figures in an image consists of the orientation, length, and width of a bounding rectangle. One fast algorithm for producing such a bounding rectangle is base...
View Book →
Exploring .NET Core
with Microservices, ASP.NET Core, and Entity Framework Core...
View Book →
Rethinking Productivity in Software Engineering
...
View Book →
Invent Your Own Computer Games with Python
A beginner's guide to computer programming in Python...
View Book →Cooperative Product Games
I introduce cooperative product games (CPGs), a cooperative game where every player has a weight, and the value of a coalition is the product of the weights of the players in the coalition. I only loo...
View Book →
Automated Machine Learning
Methods, Systems, Challenges...
View Book →
Intel Galileo and Intel Galileo Gen 2
API Features and Arduino Projects for Linux Programmers...
View Book →
Programming for Computations - Python
A Gentle Introduction to Numerical Simulations with Python 3.6...
View Book →
Foundations of Software Science and Computation Structures
21st International Conference, FOSSACS 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14–20, 2018. Proceedings...
View Book →
Think Java
How to Think Like a Computer Scientist...
View Book →
Cyber-Physical Systems of Systems
Foundations – A Conceptual Model and Some Derivations: The AMADEOS Legacy...
View Book →
Models, Methods and Tools for Product Service Design
The Manutelligence Project...
View Book →
Think Raku (Think Perl 6)
How to Think Like a Computer Scientist...
View Book →
Computational Frameworks for the Fast Fourier Transform (Frontiers in Applied Mathematics)
First published in 1987...
View Book →
The InfoSec Handbook
An Introduction to Information Security...
View Book →
Signal Computing
Digital Signals in the Software Domain...
View Book →CIA Reading Room cia-rdp96-00789r003800410001-5: ENHANCED HUMAN PERFORMANCE INVESTIGATION
L I prove For Release 2000/08/10 : CIA-RDP96-00789R003800410001-5 Final Technical Report December 1986 Covering the Period 1 July 1986 to 15 November 1986 E~~ 1 r111~ ENHANCED HUMAN PERFORMANCE INVEST...
View Book →
Sustainable Manufacturing
Challenges, Solutions and Implementation Perspectives...
View Book →
Handbook of Vascular Biometrics
...
View Book →
Managed Software Evolution
...
View Book →
Ray Tracing Gems
High-Quality and Real-Time Rendering with DXR and Other APIs...
View Book →
How to Think Like a Computer Scientist
Learning with Python...
View Book →
Vector Control of Induction Machines
First published in 2012...
View Book →ERIC ED633324: Using Visualizations of Students' Coding Processes to Detect Patterns Related to Comp
Computational thinking (CT) has emerged as a key topic of interest in K-12 education. Children that are exposed at an early age to STEM curriculum, such as computer programming and computational think...
View Book →
Digital Video Concepts, Methods, and Metrics
Quality, Compression, Performance, and Power Trade-off Analysis...
View Book →CIA Reading Room cia-rdp98-00500r000200180002-9: SUPPORT TO U.S. DEPARTMENT OF STATE'S BUREAU FOR IN
Declassified in Part - Sanitized Copy Approved for Release 2013/01/23: CIA-RDP98-0050OR000200180002-9 7 7 C C :1 7 7 7 7 SUPPORT to U.S. DEPARTMENT OF STATE'S BUREAU FOR INTERNATIONAL NARCOTICS MATTER...
View Book →
Factories of the Future
The Italian Flagship Initiative...
View Book →
Security in Computer and Information Sciences
First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...
View Book →
Programming Languages and Systems
27th European Symposium on Programming, ESOP 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings...
View Book →
Gender Differences in Computer and Information Literacy
An In-depth Analysis of Data from ICILS...
View Book →
Intertwingled
The Work and Influence of Ted Nelson...
View Book →CIA Reading Room cia-rdp90t00114r000404380001-9: CONTRIBUTION TO ARTICLE 305 STUDY ON SUPERCOMPUTERS
Declassified in Part - Sanitized Copy Approved for Release 2012/02/28: CIA-RDP90TO0114R000404380001-9 5X1 DATE ~6-I O DOC NO G1- M 97- t')O3( OIR PGPD J Untral Intelligence Agency 2 5 FEB 1987 MEMORAN...
View Book →Quantum and Classical Strong Direct Product Theorems and Optimal Time-Space Tradeoffs
A strong direct product theorem says that if we want to compute k independent instances of a function, using less than k times the resources needed for one instance, then our overall success probabili...
View Book →
What Is Data Science?
The future belongs to the companies and people that turn data into products...
View Book →CIA Reading Room cia-rdp10-02196r000800030005-9: SOVIET ATOMIC ENERGY VOL. 48, NO. 6
Declassified and Approved For Release 2013/02/01: CIA-RDP10-02196R000800030005-9 I JJI\ VVJY'JJ I * Russian Original Vol. 48, No. 6, June, 1980 December, 1980 SATEAZ 48(6) 353-422 (1980) SOVIET ATOMIC...
View Book →
The Computers That Made Britain
The home computer revolution of the 1980s...
View Book →
Autonomous Control for a Reliable Internet of Services
Methods, Models, Approaches, Techniques, Algorithms, and Tools...
View Book →
CS Unplugged
An enrichment and extension programme for primary-aged students...
View Book →
Fundamentals of Business Process Management
...
View Book →
Computation and the Humanities
Towards an Oral History of Digital Humanities...
View Book →