Warning: file_put_contents(cache/omni_6782d215adefe360c2f7f6f925832226.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Linux Network Administrator's Guide
Unix-compatible operating system...
View Book →
Access to Online Resources
A Guide for the Modern Librarian...
View Book →
Digital Video Concepts, Methods, and Metrics
Quality, Compression, Performance, and Power Trade-off Analysis...
View Book →
Financial cryptography [electronic resource] : 8th international conference, FC 2004, Key West, FL,
Financial Cryptography: 8th International Conference, FC 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers Author: Ari Juels Published by Springer Berlin Heidelberg ISBN: 978-3-540-22420-4 ...
View Book →Phishing Detection A Hybrid Model With Feature Selection And Machine Learning Techniques
Various phishing problems increase in cyber space with the progress of information technology. One of the prominent cyber-attacks rooted in social engineering is known as phishing. This malicious acti...
View Book →
Fundamentals of Biomechanics
Equilibrium, Motion, and Deformation...
View Book →Secure two-factor mutual authentication scheme using shared image in medical healthcare environment
The cloud healthcare system has become the essential online service during the COVID-19 pandemic. In this type of system, the authorized user may login to a distant server to acquire the service and r...
View Book →
Foundations of Quantum Theory
From Classical Concepts to Operator Algebras...
View Book →
Interface Oral Health Science 2016
Innovative Research on Biosis–Abiosis Intelligent Interface...
View Book →
Signal Computing
Digital Signals in the Software Domain...
View Book →
Programming Computer Vision with Python
Tools and algorithms for analyzing images...
View Book →
Algorithmic Graph Theory and Sage
...
View Book →
Using Self-Organizing Maps for Computer Network Intrusion Detection
Anomaly detection in user access patterns using artificial neural networks is a novel way of combating the ever-present concern of computer network intrusion detection for many entities around the wor...
View Book →
Pro TBB
C++ Parallel Programming with Threading Building Blocks...
View Book →
Programming for Computations - Python
A Gentle Introduction to Numerical Simulations with Python 3.6...
View Book →
Problems in Classical Electromagnetism
157 Exercises with Solutions...
View Book →
Intel Xeon Phi Coprocessor Architecture and Tools
The Guide for Application Developers...
View Book →
Introduction to Data Science
Data Analysis and Prediction Algorithms with R...
View Book →
Solving PDEs in Python
The FEniCS Tutorial I...
View Book →
Finite Difference Computing with PDEs
A Modern Software Approach...
View Book →DTIC AD1017678: TRAC Searchable Research Library
In 2015 the TRADOC Analysis Center (TRAC) initiated the Digital Research Library project to develop a secure network accessible document repository for technical documents and similar document artifac...
View Book →
Foundations of Machine Learning
...
View Book →
Enhanced Living Environments
Algorithms, Architectures, Platforms, and Systems...
View Book →
Fractional Graph Theory
A Rational Approach to the Theory of Graphs...
View Book →DTIC ADA514993: An Augmented Computer User Login Authentication Using Classifying Regions of Keystro
We present an authentication system using classifying regions of keystroke density based on a neural network architecture with two types of connections: (1) weight vector W and (2) dispersion vector V...
View Book →
Biodiversity and Health in the Face of Climate Change
...
View Book →
Java Web Scraping Handbook
Learn advanced Web Scraping techniques...
View Book →
Optimizing software in C++
An optimization guide for Windows, Linux and Mac platforms...
View Book →
Data Parallel C++
Mastering DPC++ for Programming of Heterogeneous Systems using C++ and SYCL...
View Book →
Error-Correction Coding and Decoding
Bounds, Codes, Decoders, Analysis and Applications...
View Book →
Russia's Turn to the East
Domestic Policymaking and Regional Cooperation...
View Book →
sovereign-frequency-archive
<!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <title>THE SOVEREIGN FREQUENCY...
View Book →
Spatial Thinking in Planning Practice
An Introduction to GIS...
View Book →
Statistics with Julia
Fundamentals for Data Science, Machine Learning and Artificial Intelligence...
View Book →
Physical (A)Causality
Determinism, Randomness and Uncaused Events...
View Book →FSTVAL: a new web tool to validate bulk flanking sequence tags.
This article is from Plant Methods , volume 8 . Abstract Background: Information about a transgene locus is one of the major concerns in transgenic research because expression of the transgene or a ge...
View Book →
Kubernetes for Full-Stack Developers
...
View Book →
Linear Selection Indices in Modern Plant Breeding
...
View Book →
Migrating SQL Server Databases to Azure
Microsoft Azure Essentials...
View Book →
ShmooCon 2007 Slides
ShmooCon 2007 2007 Speakers Speaker Selection We promised to list our CFP selection commitee. This team reviewed a ton of quality papers. A true thanks goes out to these folks: 3ric, Bob Fleck, cazz, ...
View Book →
Clinical Text Mining
Secondary Use of Electronic Patient Records...
View Book →
Variant Construction from Theoretical Foundation to Applications
...
View Book →
A Graduate Course in Applied Cryptography
The indispensable tool used to protect information in computing systems...
View Book →
Efficient Learning Machines
Theories, Concepts, and Applications for Engineers and System Designers...
View Book →
Optimizing HPC Applications with Intel Cluster Tools
Hunting Petaflops...
View Book →
Understanding Machine Learning
From Theory to Algorithms...
View Book →
Intelligent Human Computer Interaction
9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017, Proceedings...
View Book →
Analysis for Computer Scientists
Foundations, Methods, and Algorithms...
View Book →
Ambisonics
A Practical 3D Audio Theory for Recording, Studio Production, Sound Reinforcement, and Virtual Reality...
View Book →
Building Modern Web Applications With Spring Boot and Vaadin
A practical introduction to web application development using Java...
View Book →
Bayesian Methods in the Search for MH370
...
View Book →
Sensitivity Analysis: Matrix Methods in Demography and Ecology
...
View Book →
Annotated Algorithms in Python
With applications in Physics, Biology, and Finance...
View Book →
Language Technologies for the Challenges of the Digital Age
27th International Conference, GSCL 2017, Berlin, Germany, September 13-14, 2017, Proceedings...
View Book →
Ionospheric Multi-Spacecraft Analysis Tools
Approaches for Deriving Ionospheric Parameters...
View Book →