Warning: file_put_contents(cache/omni_abff3000aa9b6775988bdc16be28fecb.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Optimizing software in C++
An optimization guide for Windows, Linux and Mac platforms...
View Book →
Signal Computing
Digital Signals in the Software Domain...
View Book →
Representation Learning for Natural Language Processing
...
View Book →
Bayesian Methods in the Search for MH370
...
View Book →
Feminist media : participatory spaces, networks and cultural citizenship
Includes bibliographical references. Description based on print version record; resource not viewed....
View Book →
Programming for Computations - Python
A Gentle Introduction to Numerical Simulations with Python 3.6...
View Book →
The Amazing Journey of Reason
from DNA to Artificial Intelligence...
View Book →
Error-Correction Coding and Decoding
Bounds, Codes, Decoders, Analysis and Applications...
View Book →
National Security Commission on Artificial Intelligence
Federal Advisory Committee depository collection. Committee name may vary....
View Book →
High-Performance Modelling and Simulation for Big Data Applications
Selected Results of the COST Action IC1406 cHiPSet...
View Book →
Environmental impact of aviation and sustainable solutions
Includes bibliographical references. Description based on print version record; resource not viewed....
View Book →
IEA International Computer and Information Literacy Study 2018 Assessment Framework
...
View Book →
Security in Computer and Information Sciences
First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers...
View Book →
Internet of Things
Information Processing in an Increasingly Connected World...
View Book →
Digital Video Concepts, Methods, and Metrics
Quality, Compression, Performance, and Power Trade-off Analysis...
View Book →
https://www.copyright.gov/1201/2011/initial/IDA_Mark_Berger.pdf
Before the United States Copyright Office Library of Congress In the Matter of Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies ) ) ) ) ) ) ) D...
View Book →
Communicative Figurations
Transforming Communications in Times of Deep Mediatization...
View Book →
Handbook of Vascular Biometrics
...
View Book →http://www.digitalpreservation.gov/documents/CRL_digiNews_report_110502.pdf
PRESERVING NEWS IN THE DIGITAL ENVIRONMENT: MAPPING THE NEWSPAPER INDUSTRY IN TRANSITION A Report from the Center for Research Libraries April 27 , 2011 CRL Mapping the Newspaper Industry 1|Page This ...
View Book →
Network propaganda : manipulation, disinformation, and radicalization in American politics
Includes bibliographical references and index. Description based on print version record; resource not viewed....
View Book →
Foundations of Software Science and Computation Structures
21st International Conference, FOSSACS 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14–20, 2018. Proceedings...
View Book →
Understanding Machine Learning
From Theory to Algorithms...
View Book →
Preparing for Life in a Digital World
IEA International Computer and Information Literacy Study 2018 International Report...
View Book →
Computer and Information Sciences
31st International Symposium, ISCIS 2016, Kraków, Poland, October 27–28, 2016, Proceedings...
View Book →
Computation and the Humanities
Towards an Oral History of Digital Humanities...
View Book →
Platform Embedded Security Technology Revealed
Safeguarding the Future of Computing with Intel Embedded Security and Management Engine...
View Book →
Natural Computing and Beyond
Winter School Hakodate 2011, Hakodate, Japan, March 2011 and 6th International Workshop on Natural Computing, Tokyo, Japan, March 2012, Proceedings...
View Book →
Access controlled : the shaping of power, rights, and rule in cyberspace
Report from the OpenNet Initiative. Includes bibliographical references and index. Description based on print version record; resource not viewed....
View Book →
Programming for Computations - MATLAB/Octave
A Gentle Introduction to Numerical Simulations with MATLAB/Octave...
View Book →
Optimizing HPC Applications with Intel Cluster Tools
Hunting Petaflops...
View Book →
Clinical Text Mining
Secondary Use of Electronic Patient Records...
View Book →
Informatics in the Future
Proceedings of the 11th European Computer Science Summit (ECSS 2015), Vienna, October 2015...
View Book →
Intel Xeon Phi Coprocessor Architecture and Tools
The Guide for Application Developers...
View Book →
Complications and Quandaries in the ICT Sector
Standard Essential Patents and Competition Issues...
View Book →
Human rights in the age of platforms
"What are the human rights implications and effects of a commercialized public sphere? Private companies mediate most of our time online. Internet companies manage the web-based public infrastructure,...
View Book →
Wikipedia @ 20 : stories of an incomplete revolution
"Founders, contributors, scholars, teachers, and students reflect on Wikipedia's first 20 years"-- Provided by publisher....
View Book →
The academic book of the future
Includes bibliographical references (pages 104-113) and index. Description based on print version record; resource not viewed....
View Book →
Interdisciplinary Insights for Digital Touch Communication
...
View Book →
Ray Tracing Gems
High-Quality and Real-Time Rendering with DXR and Other APIs...
View Book →
Preparing for Life in a Digital Age
The IEA International Computer and Information Literacy Study International Report...
View Book →
Think Complexity
Complexity Science and Computational Modeling...
View Book →
Pro TBB
C++ Parallel Programming with Threading Building Blocks...
View Book →
Surveillance - society - culture
"What only a few decades ago would have been considered a totalitarian nightmare seems to have become reality: Surveillance practices and technologies have infiltrated all aspects of our lives, forcin...
View Book →
The Huawei and Snowden Questions
Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?...
View Book →
Autonomous Control for a Reliable Internet of Services
Methods, Models, Approaches, Techniques, Algorithms, and Tools...
View Book →
Finite Difference Computing with PDEs
A Modern Software Approach...
View Book →
Defense against the black arts : how hackers do what they do and how to protect against it
Includes index. Description based on print version record; resource not viewed....
View Book →
Annotated Algorithms in Python
With applications in Physics, Biology, and Finance...
View Book →
Tools and Algorithms for the Construction and Analysis of Systems
25 Years of TACAS: TOOLympics, Held as Part of ETAPS 2019, Prague, Czech Republic, April 6–11, 2019, Proceedings, Part III...
View Book →
Language Technologies for the Challenges of the Digital Age
27th International Conference, GSCL 2017, Berlin, Germany, September 13-14, 2017, Proceedings...
View Book →
Among digitized manuscripts : philology, codicology, paleography in a digital world
"Working with manuscripts has become a digital affair. But, are there downsides to digital photos? And how can you take advantage of the incredible computing power you have literally at your fingertip...
View Book →
The InfoSec Handbook
An Introduction to Information Security...
View Book →
Rethinking Productivity in Software Engineering
...
View Book →
Cape Town harmonies : memory, humour and resilience
Description based on print version record; resource not viewed....
View Book →
Efficient Learning Machines
Theories, Concepts, and Applications for Engineers and System Designers...
View Book →
Solving PDEs in Python
The FEniCS Tutorial I...
View Book →
https://www.copyright.gov/1201/2011/initial/eff.pdf
Before the U.S. COPYRIGHT OFFICE LIBRARY OF CONGRESS In the matter of exemption to prohibition on circumvention of copyright protection systems for access control technologies Docket No. RM 2011-07 Co...
View Book →
Enabling Things to Talk
Designing IoT solutions with the IoT Architectural Reference Model...
View Book →
Cultural and political imaginaries in Putin's Russia
"In Cultural and Political Imaginaries in Putin's Russia scholars scrutinise developments in official symbolical, cultural and social policies as well as the contradictory trajectories of important cu...
View Book →
Intelligent Human Computer Interaction
9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017, Proceedings...
View Book →
Cyber-Physical Systems of Systems
Foundations – A Conceptual Model and Some Derivations: The AMADEOS Legacy...
View Book →
Enhanced Living Environments
Algorithms, Architectures, Platforms, and Systems...
View Book →
Analysis for Computer Scientists
Foundations, Methods, and Algorithms...
View Book →
Policy-Oriented Technology Assessment Across Europe: Expanding Capacities
...
View Book →
Data Parallel C++
Mastering DPC++ for Programming of Heterogeneous Systems using C++ and SYCL...
View Book →
Programming Computer Vision with Python
Tools and algorithms for analyzing images...
View Book →
Computer Aided Verification
31st International Conference, CAV 2019, New York City, NY, USA, July 15-18, 2019, Proceedings, Part I...
View Book →
Physical (A)Causality
Determinism, Randomness and Uncaused Events...
View Book →
Variant Construction from Theoretical Foundation to Applications
...
View Book →
Saving new sounds : podcast preservation and historiography
"Over seventy-five million Americans listen to podcasts every month, and the average weekly listener spends over six hours tuning into podcasts from the more than thirty million podcast episodes curre...
View Book →
Foundations of Machine Learning
...
View Book →
Five Albanian villages : guidelines for a sustainable tourism development through the enhancement of
Includes bibliographical references (pages 301-311). Description based on print version record; resource not viewed....
View Book →
Trade Unions on YouTube
Online Revitalization in Sweden...
View Book →
Dying in full detail : mortality and digital documentary
Includes bibliographical references (pages 231-239) and index. Description based on print version record; resource not viewed....
View Book →
Moving images : mediating migration as crisis
Includes bibliographical references (pages 287-313). Description based on print version record; resource not viewed....
View Book →
Invent Your Own Computer Games with Python
A beginner's guide to computer programming in Python...
View Book →
Gender Differences in Computer and Information Literacy
An In-depth Analysis of Data from ICILS...
View Book →
Software for Exascale Computing - SPPEXA 2016-2019
...
View Book →