Warning: file_put_contents(cache/omni_467e21a4dc1d24b3ab322fadc402aedb.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Research On and Activities For Mathematically Gifted Students
...
View Book →Fortran interface to vector programming
First published in 1978...
View Book →
Hacking Secret Ciphers with Python
A beginner's guide to cryptography and computer programming with Python...
View Book →
Digital Video Concepts, Methods, and Metrics
Quality, Compression, Performance, and Power Trade-off Analysis...
View Book →
Tools and Algorithms for the Construction and Analysis of Systems
25 Years of TACAS: TOOLympics, Held as Part of ETAPS 2019, Prague, Czech Republic, April 6–11, 2019, Proceedings, Part III...
View Book →Reproducing and learning new algebraic operations on word embeddings using genetic programming
Word-vector representations associate a high dimensional real-vector to every word from a corpus. Recently, neural-network based methods have been proposed for learning this representation from large ...
View Book →
Higher Education in the Era of the Fourth Industrial Revolution
...
View Book →
Data Information Literacy
Librarians, Data, and the Education of a New Generation of Researchers...
View Book →
Ionospheric Multi-Spacecraft Analysis Tools
Approaches for Deriving Ionospheric Parameters...
View Book →
Optimizing software in C++
An optimization guide for Windows, Linux and Mac platforms...
View Book →Preliminary testing and evaluation of new computer programs for traffic analysis, task : evaluation
To evaluate the potential of supercomputers in traffic simulation/modelling, two representative traffic modelling packages were converted and run on two representative supercomputers. The models teste...
View Book →
Making Games with Python & Pygame
A guide to programming with graphics, animation, and sound...
View Book →Geometric Morphometrics of Nine Field Isolates of Aedes aegypti with Different Resistance Levels to
This article is from PLoS ONE , volume 9 . Abstract Aedes aegypti, a mosquito closely associated with humans, is the principal vector of dengue virus which currently infects about 400 million people w...
View Book →
Pro TBB
C++ Parallel Programming with Threading Building Blocks...
View Book →
Russia's Turn to the East
Domestic Policymaking and Regional Cooperation...
View Book →
Vectors, a programmed text for introductory physics
First published in 1962...
View Book →
Analysis for Computer Scientists
Foundations, Methods, and Algorithms...
View Book →DTIC ADA234455: Coordinate System Conversion Software User's Guide for Attitude, Quaternion, M50 and
The Coordinate System Conversion Software is a collection of general purpose subroutines and functions which may be used to transform vector quantities from one coordinate system to another. The repor...
View Book →CIA Reading Room cia-rdp93t01222r000300140001-6: NICARAGUA: DOMESTIC AND FOREIGN POLICY TRENDS
Declassified in Part - Sanitized Copy Approved for Release 2013/01/17: CIA-RDP93T01222R000300140001-6 Director of Central Intelligence 25X1 Nicaragua: Domestic and Foreign Policy Trends Special Intera...
View Book →
Clinical Text Mining
Secondary Use of Electronic Patient Records...
View Book →
Programming for Computations - Python
A Gentle Introduction to Numerical Simulations with Python 3.6...
View Book →
Enhanced Living Environments
Algorithms, Architectures, Platforms, and Systems...
View Book →DTIC ADA445625: Analysis and Implementation of an Implicitly Restarted Arnoldi Iteration
The Arnoldi algorithm, or iteration, is a computationally attractive technique for computing a few eigenvalues and associated invariant subspace of large, often sparse, matrices. The method is a gener...
View Book →
FREQUENCY-BASED FEATURE EXTRACTION FOR MALWARE CLASSIFICATION
Traditional signature-based malware detection is effective, but it can only identify known malicious programs. This thesis attempts to use machine-learning techniques to successfully identify previous...
View Book →
Sensitivity Analysis: Matrix Methods in Demography and Ecology
...
View Book →
Fundamentals of Biomechanics
Equilibrium, Motion, and Deformation...
View Book →
Annotated Algorithms in Python
With applications in Physics, Biology, and Finance...
View Book →DTIC ADA206389: Krylov Methods Preconditioned with Incompletely Factored Matrices on the CM-2
This work measured what might be regarded best case timings for the sparse matrix vector multiplies, sparse triangular solves, and inner products that constitute the iterative portion of Krylov space ...
View Book →DTIC ADA240123: Aircraft Landing Dynamic Analysis. Volume 1. Equations of Motion
This report is Volume 1 of a two volume report. The first volume provides the derivation of the equations of motion and the second volume documents the computer program. The equations of motion are de...
View Book →
Empowering Teachers to Build a Better World
How Six Nations Support Teachers for 21st Century Education...
View Book →A programmed introduction to vectors
First published in 1963...
View Book →
Data Parallel C++
Mastering DPC++ for Programming of Heterogeneous Systems using C++ and SYCL...
View Book →
Clinical Methods in Medical Family Therapy
...
View Book →
Visions for Intercultural Music Teacher Education
...
View Book →
Computer networking
First published in 1900...
View Book →
The Dynamics of Opportunity in America
Evidence and Perspectives...
View Book →
Intelligent Human Computer Interaction
9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017, Proceedings...
View Book →Field evaluation of four widely used mosquito traps in Central Europe.
This article is from Parasites & Vectors , volume 7 . Abstract Background: To monitor adult mosquitoes several trapping devices are available. These are differently constructed and use various mechani...
View Book →
A programmed vector algebra
First published in 1969...
View Book →
DTIC ADA416936: Military-Relevant Infectious Diseases Endemic to Kenya-Epidemiology, Immunology, Pat
Major expansion in personnel and infrastructure took place in the first year of this Cooperative Agreement. Clinical research facilities for the evaluation of drugs and vaccines for malaria and HIV/AI...
View Book →
Linear Selection Indices in Modern Plant Breeding
...
View Book →
Efficient Learning Machines
Theories, Concepts, and Applications for Engineers and System Designers...
View Book →
Interface Oral Health Science 2016
Innovative Research on Biosis–Abiosis Intelligent Interface...
View Book →
Signal Computing
Digital Signals in the Software Domain...
View Book →
Getting started with OpenOffice.org 3
vi, 428 pages : 26 cm...
View Book →
Think Java
How to Think Like a Computer Scientist...
View Book →
ibm :: 1620 :: programs :: 10.1.008 Linear Programming II
From the bitsavers.org collection, a scanned-in computer-related document. ibm :: 1620 :: programs :: 10.1.008 Linear Programming II...
View Book →
Diversity and Inclusion in Global Higher Education
Lessons from Across Asia...
View Book →
DTIC ADA125561: High-Performance Banded and Profile Equation Solvers for the CRAY-1. I. The Unsymmet
This report describes algorithms, performance, applications, and user information associated with two equation-solving codes for the CRAY-1: (1) Solution of a single banded matrix equation, unsymmetri...
View Book →
Foundations of Quantum Theory
From Classical Concepts to Operator Algebras...
View Book →
Limited sequence polymorphisms of four transmission-blocking vaccine candidate antigens in Plasmodiu
This article is from Malaria Journal , volume 12 . Abstract Background: Transmission-blocking vaccines (TBVs), which target the sexual stages of malaria parasites to interfere with and/or inhibit the ...
View Book →
Error-Correction Coding and Decoding
Bounds, Codes, Decoders, Analysis and Applications...
View Book →
Ambisonics
A Practical 3D Audio Theory for Recording, Studio Production, Sound Reinforcement, and Virtual Reality...
View Book →
Spinor Lie derivatives and Fermion stress-energies
Stress-energies for Fermi fields are derived from the principle of general covariance. This is done by developing a notion of Lie derivatives of spinors along arbitrary vector fields. A substantial th...
View Book →
Vector programming tools and techniques
First published in 1978...
View Book →
Children and Peace
From Research to Action...
View Book →
Biodiversity and Health in the Face of Climate Change
...
View Book →
Talent Development in European Higher Education
Honors programs in the Benelux, Nordic and German-speaking countries...
View Book →
DTIC ADA395637: Dielectric Properties of Landmine Fillers (Waxes and Sands)
This report contains dielectric property measurement results for five different materials that have been used as fillers for various inert landmines. The original data were collected in the form of th...
View Book →
NASA Technical Reports Server (NTRS) 20110014226: Data-Driven Anomaly Detection Performance for the
In this paper, we will assess the performance of a data-driven anomaly detection algorithm, the Inductive Monitoring System (IMS), which can be used to detect simulated Thrust Vector Control (TVC) sys...
View Book →
Computer Aided Verification
31st International Conference, CAV 2019, New York City, NY, USA, July 15-18, 2019, Proceedings, Part I...
View Book →
Computer Networks
First published in 1981...
View Book →
Bayesian Methods in the Search for MH370
...
View Book →
Understanding Machine Learning
From Theory to Algorithms...
View Book →
Linear Algebra with Applications
First published in 1984...
View Book →
Finite Difference Computing with PDEs
A Modern Software Approach...
View Book →
Solving PDEs in Python
The FEniCS Tutorial I...
View Book →
Physical (A)Causality
Determinism, Randomness and Uncaused Events...
View Book →A programming language for vector computers
First published in 1993...
View Book →
The Early Years
Child Well-Being and the Role of Public Policy...
View Book →
Aging Well
Solutions to the Most Pressing Global Challenges of Aging...
View Book →
Invent Your Own Computer Games with Python
A beginner's guide to computer programming in Python...
View Book →
Foundations of Machine Learning
...
View Book →
Variant Construction from Theoretical Foundation to Applications
...
View Book →
Intel Xeon Phi Coprocessor Architecture and Tools
The Guide for Application Developers...
View Book →
Language Technologies for the Challenges of the Digital Age
27th International Conference, GSCL 2017, Berlin, Germany, September 13-14, 2017, Proceedings...
View Book →
DTIC ADA221979: Computational Methods for Problems in Aerodynamics and Large Space Structures Using
The objective of our research was to design a computer code capable of simulating interactions between complicated flows and shock waves. It is possible to completely overcome the Gibbs phenomenon fro...
View Book →
Optimizing HPC Applications with Intel Cluster Tools
Hunting Petaflops...
View Book →