Warning: file_put_contents(cache/omni_7818ad8af65058bd36cff34171c2c769.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
The Haskell School of Music
From Signals to Symphonies...
View Book →
Rethinking the Internet of Things
A Scalable Approach to Connecting Everything...
View Book →
Internet of Things
Information Processing in an Increasingly Connected World...
View Book →
Representation Learning for Natural Language Processing
...
View Book →Unsupervised Total Variation Loss for Semi-supervised Deep Learning of Semantic Segmentation
We introduce a novel unsupervised loss function for learning semantic segmentation with deep convolutional neural nets (ConvNet) when densely labeled training images are not available. More specifical...
View Book →
SVG Colors, Patterns & Gradients
First published in 2015...
View Book →
Platform Embedded Security Technology Revealed
Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...
View Book →
Finite Difference Computing with PDEs
A Modern Software Approach...
View Book →
Intel Galileo and Intel Galileo Gen 2
API Features and Arduino Projects for Linux Programmers...
View Book →dec :: tech reports :: CRL-99-4
From the bitsavers.org collection, a scanned-in computer-related document. dec :: tech reports :: CRL-99-4...
View Book →
IEA International Computer and Information Literacy Study 2018 Assessment Framework
...
View Book →
High Performance Computing On Vector Systems 2008
First published in 2008...
View Book →
Data Parallel C++
Mastering DPC++ for Programming of Heterogeneous Systems using C++ and SYCL...
View Book →Rental harmony with roommates
We prove existence of envy-free allocations in markets with heterogenous indivisible goods and money, when a given quantity is supplied from each of the goods and agents have unit demands. We depart f...
View Book →
Solving PDEs in Python
The FEniCS Tutorial I...
View Book →
Intertwingled
The Work and Influence of Ted Nelson...
View Book →
Language Technologies for the Challenges of the Digital Age
27th International Conference, GSCL 2017, Berlin, Germany, September 13-14, 2017, Proceedings...
View Book →
Ray Tracing Gems
High-Quality and Real-Time Rendering with DXR and Other APIs...
View Book →
Efficient Learning Machines
Theories, Concepts, and Applications for Engineers and System Designers...
View Book →
Bayesian Methods in the Search for MH370
...
View Book →
Signal Computing
Digital Signals in the Software Domain...
View Book →dec :: pdp8 :: graphics :: DEC-08-G61B-D 338pgmg Oct66
From the bitsavers.org collection, a scanned-in computer-related document. dec :: pdp8 :: graphics :: DEC-08-G61B-D 338pgmg Oct66...
View Book →An Interruption Discovery Structure Depend on Cluster Centres and Adjacent Neighbours
The aim of an interruption discovery structure (IDS) is to notice various types of hateful network transfer and computer usage, which cannot be detected by a straight firewall. Many IDS have been urba...
View Book →Fast Image Classification by Boosting Fuzzy Classifiers
This paper presents a novel approach to visual objects classification based on generating simple fuzzy classifiers using local image features to distinguish between one known class and other classes. ...
View Book →
Annotated Algorithms in Python
With applications in Physics, Biology, and Finance...
View Book →NASA Technical Reports Server (NTRS) 19810009511: Failure detection and isolation analysis of a redu
The objective of this study was to define and develop techniques for failure detection and isolation (FDI) algorithms for a dual fail/operational redundant strapdown inertial navigation system are def...
View Book →
Understanding Machine Learning
From Theory to Algorithms...
View Book →
High-Performance Modelling and Simulation for Big Data Applications
Selected Results of the COST Action IC1406 cHiPSet...
View Book →
Computation and the Humanities
Towards an Oral History of Digital Humanities...
View Book →
Clinical Text Mining
Secondary Use of Electronic Patient Records...
View Book →
Fundamental Approaches to Software Engineering
21st International Conference, FASE 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings...
View Book →
Enhanced Living Environments
Algorithms, Architectures, Platforms, and Systems...
View Book →
Preparing for Life in a Digital World
IEA International Computer and Information Literacy Study 2018 International Report...
View Book →vectorGraphic :: Vector Z80 Board Users Manual May79
From the bitsavers.org collection, a scanned-in computer-related document. vectorGraphic :: Vector Z80 Board Users Manual May79...
View Book →ibm :: sage :: 3-62-0 Display System Vol1 Aug58
From the bitsavers.org collection, a scanned-in computer-related document. ibm :: sage :: 3-62-0 Display System Vol1 Aug58...
View Book →Can Boosting with SVM as Week Learners Help?
Object recognition in images involves identifying objects with partial occlusions, viewpoint changes, varying illumination, cluttered backgrounds. Recent work in object recognition uses machine learni...
View Book →
The Amazing Journey of Reason
from DNA to Artificial Intelligence...
View Book →
Informatics in the Future
Proceedings of the 11th European Computer Science Summit (ECSS 2015), Vienna, October 2015...
View Book →
Optimizing HPC Applications with Intel Cluster Tools
Hunting Petaflops...
View Book →
Autonomous Control for a Reliable Internet of Services
Methods, Models, Approaches, Techniques, Algorithms, and Tools...
View Book →
CIA Reading Room cia-rdp78b04747a000100090004-8: GENTLEMEN:
LIZ- Declass Review by NIMA/DOD Chief, Procurement Division 2430 8 Street, N.W. Washington 25, D. C. November 30, 1964 Gentlemen= Reference to your interest in the AP/2 plotting system, it would Perfo...
View Book →
Computer Aided Verification
31st International Conference, CAV 2019, New York City, NY, USA, July 15-18, 2019, Proceedings, Part I...
View Book →
How to Think Like a Computer Scientist
Learning with Python...
View Book →
Theoretical and Practical Advances in Computer-based Educational Measurement
...
View Book →
Computer and Information Sciences
31st International Symposium, ISCIS 2016, Kraków, Poland, October 27–28, 2016, Proceedings...
View Book →
Analysis for Computer Scientists
Foundations, Methods, and Algorithms...
View Book →
ibm :: 1620 :: general program library :: 5.0.021 Crout Reduction
From the bitsavers.org collection, a scanned-in computer-related document. ibm :: 1620 :: general program library :: 5.0.021 Crout Reduction...
View Book →
Foundations of Software Science and Computation Structures
21st International Conference, FOSSACS 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14–20, 2018. Proceedings...
View Book →
Problem solving, abstraction, and design using C++
First published in 1993...
View Book →
Software for Exascale Computing - SPPEXA 2016-2019
...
View Book →
Introduction to Parallel and Vector Scientific Computation
First published in 2006...
View Book →
Pro TBB
C++ Parallel Programming with Threading Building Blocks...
View Book →
Vector 8800V
documents relating to the vector 8800V DIP plugboard for the s100 bus...
View Book →
Invent Your Own Computer Games with Python
A beginner's guide to computer programming in Python...
View Book →
International Symposium on Mathematics, Quantum Theory, and Cryptography
Proceedings of MQC 2019...
View Book →
Foundations of Machine Learning
...
View Book →NASA Technical Reports Server (NTRS) 19860002770: User's guide to STIPPAN: A panel method program fo
Guidelines are presented for use of the computer program STIPPAN to simulate the subsonic flow in a slotted wind tunnel test section with a known model disturbance. Input data requirements are defined...
View Book →NASA Technical Reports Server (NTRS) 19770003436: Performance analysis of flexible aircraft with act
Small perturbation equations of motion of a flexible aircraft with an active control technology (ACT) system were developed to evaluate the stability and performance of the controlled aircraft. The to...
View Book →
Programming Computer Vision with Python
Tools and algorithms for analyzing images...
View Book →
Security in Computer and Information Sciences
First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...
View Book →Computer education of chemists
"Based on a symposium presented at the 184th national meeting of the American Chemical Society, Kansas City, Missouri, September 1982"--Title page verso...
View Book →
Partial differential equations for computational science
First published in 1998...
View Book →
Intelligent Human Computer Interaction
9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017, Proceedings...
View Book →
CS Unplugged
An enrichment and extension programme for primary-aged students...
View Book →
Calculus&Mathematica
First published in 1994...
View Book →
Defense against the Black Arts
How Hackers Do What They Do and How to Protect against It...
View Book →
The Computers That Made Britain
The home computer revolution of the 1980s...
View Book →
DTIC ADA224011: Block Lanczos Algorithm
We use a Lanczos algorithm for computing a few of the smallest eigenvalues and the corresponding eigenvectors of a large symmetric matrix rather than computing all the eigenvalue-eigenvector pairs. Th...
View Book →
Digital Video Concepts, Methods, and Metrics
Quality, Compression, Performance, and Power Trade-off Analysis...
View Book →
Developing Graphics Frameworks with Python and OpenGL
...
View Book →
Programming for Computations - Python
A Gentle Introduction to Numerical Simulations with Python 3.6...
View Book →Drawing and Recognizing Chinese Characters with Recurrent Neural Network
Recent deep learning based approaches have achieved great success on handwriting recognition. Chinese characters are among the most widely adopted writing systems in the world. Previous research has m...
View Book →
Preparing for Life in a Digital Age
The IEA International Computer and Information Literacy Study International Report...
View Book →Geodesics on Shape Spaces with Bounded Variation and Sobolev Metrics
This paper studies the space of $BV^2$ planar curves endowed with the $BV^2$ Finsler metric over its tangent space of displacement vector fields. Such a space is of interest for applications in image ...
View Book →
The InfoSec Handbook
An Introduction to Information Security...
View Book →univOfIllinoisUrbana :: illiac :: ILLIAC :: Active Library :: M15-183
From the bitsavers.org collection, a scanned-in computer-related document. univOfIllinoisUrbana :: illiac :: ILLIAC :: Active Library :: M15-183...
View Book →
Think Java
How to Think Like a Computer Scientist...
View Book →
Gender Differences in Computer and Information Literacy
An In-depth Analysis of Data from ICILS...
View Book →
Scientific computing on vector computers
First published in 1987...
View Book →
Intel Xeon Phi Coprocessor Architecture and Tools
The Guide for Application Developers...
View Book →
Twin Support Vector Machines
First published in 2016...
View Book →
The Huawei and Snowden Questions
Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?...
View Book →
Introduction to Scientific Computing
First published in 1996...
View Book →
Policy-Oriented Technology Assessment Across Europe: Expanding Capacities
...
View Book →
Programming Languages and Systems
27th European Symposium on Programming, ESOP 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings...
View Book →
Optimizing software in C++
An optimization guide for Windows, Linux and Mac platforms...
View Book →
Cyber-Physical Systems of Systems
Foundations – A Conceptual Model and Some Derivations: The AMADEOS Legacy...
View Book →