Warning: file_put_contents(cache/omni_3eb1652efe8174206daa68d773cf5898.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
cdc :: cyber :: cyber 200 :: 60256010-02 Cyber 200 Model 203 Hardware Ref Preliminary May79
From the bitsavers.org collection, a scanned-in computer-related document. cdc :: cyber :: cyber 200 :: 60256010-02 Cyber 200 Model 203 Hardware Ref Preliminary May79...
View Book →
Anisotropy Across Fields and Scales
...
View Book →
Ionospheric Multi-Spacecraft Analysis Tools
Approaches for Deriving Ionospheric Parameters...
View Book →
Health of People, Health of Planet and Our Responsibility
Climate Change, Air Pollution and Health...
View Book →Analytic and Vector Mechanics
Source: Digital Library of India Scanning Centre: C-DAC, Noida Source Library: Central Library, Bits- Pilani Date Accessioned: 6/24/2015 1:32 The Digital Library of India was a project under the auspi...
View Book →
Russia's Turn to the East
Domestic Policymaking and Regional Cooperation...
View Book →CIA Reading Room cia-rdp94b00280r000700190003-9: BRIEFINGS AND REPORTS
Sanitized Copy Approved for Release 2011/03/11: CIA-RDP94B0028OR000700190003-9 Next 1 Page(s) In Document Denied Iq Sanitized Copy Approved for Release 2011/03/11: CIA-RDP94B0028OR000700190003-9 TITAN...
View Book →
Foundations of Quantum Theory
From Classical Concepts to Operator Algebras...
View Book →
Interface Oral Health Science 2016
Innovative Research on Biosis–Abiosis Intelligent Interface...
View Book →
Intel Xeon Phi Coprocessor Architecture and Tools
The Guide for Application Developers...
View Book →dec :: unibus :: EK-DL11-OP-001 Sep76
From the bitsavers.org collection, a scanned-in computer-related document. dec :: unibus :: EK-DL11-OP-001 Sep76...
View Book →
Physical (A)Causality
Determinism, Randomness and Uncaused Events...
View Book →
Statistics with Julia
Fundamentals for Data Science, Machine Learning and Artificial Intelligence...
View Book →
Bayesian Methods in the Search for MH370
...
View Book →
TB3162 - Vectored Interrupt Controller on 8-Bit MCU
First published in 2017...
View Book →
Solving PDEs in Python
The FEniCS Tutorial I...
View Book →
Spatial Thinking in Planning Practice
An Introduction to GIS...
View Book →Automated reasoning about hardware data types using bit-vectors of symbolic lengths
First published in 2003...
View Book →Use of a $d$-Constraint During LDPC Decoding in a Bliss Scheme
Bliss schemes of a run length limited (RLL) codec in combination with an LDPC codec, generate LDPC parity bits over a systematic sequence of RLL channel bits that are inherently redundant as they sati...
View Book →
Clinical Text Mining
Secondary Use of Electronic Patient Records...
View Book →Automated resasoning about Hardware data types using bit-vectors of symbolic lengths
First published in 2003...
View Book →
Foundations of Machine Learning
...
View Book →
Understanding Machine Learning
From Theory to Algorithms...
View Book →dec :: pdp8 :: graphics :: DEC-08-G61B-D 338pgmg Oct66
From the bitsavers.org collection, a scanned-in computer-related document. dec :: pdp8 :: graphics :: DEC-08-G61B-D 338pgmg Oct66...
View Book →
Enhanced Living Environments
Algorithms, Architectures, Platforms, and Systems...
View Book →
Analysis for Computer Scientists
Foundations, Methods, and Algorithms...
View Book →
Introduction to Data Science
Data Analysis and Prediction Algorithms with R...
View Book →Invariant Spectral Hashing of Image Saliency Graph
Image hashing is the process of associating a short vector of bits to an image. The resulting summaries are useful in many applications including image indexing, image authentication and pattern recog...
View Book →
Pro TBB
C++ Parallel Programming with Threading Building Blocks...
View Book →
Signal Computing
Digital Signals in the Software Domain...
View Book →cdc :: cyber :: cyber 200 :: 60256020C Cyber200 Model205 HardwareRef Nov83
From the bitsavers.org collection, a scanned-in computer-related document. cdc :: cyber :: cyber 200 :: 60256020C Cyber200 Model205 HardwareRef Nov83...
View Book →
Blown to Bits
Your Life, Liberty, and Happiness After the Digital Explosion...
View Book →
Optimizing HPC Applications with Intel Cluster Tools
Hunting Petaflops...
View Book →
Problems in Classical Electromagnetism
157 Exercises with Solutions...
View Book →
Finite Difference Computing with PDEs
A Modern Software Approach...
View Book →
Error-Correction Coding and Decoding
Bounds, Codes, Decoders, Analysis and Applications...
View Book →
NASA Technical Reports Server (NTRS) 20120016331: Method and system for efficient video compression
Disclosed are a method and system for video compression, wherein the video encoder has low computational complexity and high compression efficiency. The disclosed system comprises a video encoder and ...
View Book →
Programming for Computations - Python
A Gentle Introduction to Numerical Simulations with Python 3.6...
View Book →
International Symposium on Mathematics, Quantum Theory, and Cryptography
Proceedings of MQC 2019...
View Book →
TB3162 - Vectored Interrupt Controller on 8-Bit PIC Microcontrollers Tech. Brief
First published in 2017...
View Book →
Data Parallel C++
Mastering DPC++ for Programming of Heterogeneous Systems using C++ and SYCL...
View Book →
Programming Computer Vision with Python
Tools and algorithms for analyzing images...
View Book →The complexity of computation in bit streams
We revisit the complexity of online computation in the cell probe model. We consider a class of problems where we are first given a fixed pattern or vector $F$ of $n$ symbols and then one symbol arriv...
View Book →
Capacity Bounds for Discrete-Time, Amplitude-Constrained, Additive White Gaussian Noise Channels
The capacity-achieving input distribution of the discrete-time, additive white Gaussian noise (AWGN) channel with an amplitude constraint is discrete and seems difficult to characterize explicitly. A ...
View Book →
Ambisonics
A Practical 3D Audio Theory for Recording, Studio Production, Sound Reinforcement, and Virtual Reality...
View Book →BBC Research and Development Report Number 1984-19
R&D Report 1984-19 : L.F. radio-data: specification of BBC phase-modulated transmissions on long-wave. D.T. Wright The BBC long-wave AM transmitter network carries a low bit-rate data signal, in addit...
View Book →
Optimizing software in C++
An optimization guide for Windows, Linux and Mac platforms...
View Book →cray :: HR-0097 CRAY X-MP Series Model 48 Mainframe Ref Man Aug84
From the bitsavers.org collection, a scanned-in computer-related document. cray :: HR-0097 CRAY X-MP Series Model 48 Mainframe Ref Man Aug84...
View Book →
Variant Construction from Theoretical Foundation to Applications
...
View Book →
Efficient Learning Machines
Theories, Concepts, and Applications for Engineers and System Designers...
View Book →Faults-as-address simulation
Fault-as-address-simulation (FAAS) is a simulation mechanism for testing combinations of circuit line faults, represented by the bit addresses of element logical vectors. The XOR relationship between ...
View Book →
Fractional Graph Theory
A Rational Approach to the Theory of Graphs...
View Book →
Linear Selection Indices in Modern Plant Breeding
...
View Book →Diamond Orientation in Diamond Bits
First published in 1951...
View Book →
Representation Learning for Natural Language Processing
...
View Book →
Transform vector quantisation of speech at low bit rates
First published in 1995...
View Book →
Spectral and High Order Methods for Partial Differential Equations ICOSAHOM 2018
Selected Papers from the ICOSAHOM Conference, London, UK, July 9-13, 2018...
View Book →
[An efficient system for reliably transmitting image and video data over low bit rate noise]
First published in 1994...
View Book →
Fundamentals of Biomechanics
Equilibrium, Motion, and Deformation...
View Book →
Intelligent Human Computer Interaction
9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017, Proceedings...
View Book →
TB3162 Vectored Interrupt Controller on 8-Bit PIC Microcontrollers
First published in 2019...
View Book →
Software for Exascale Computing - SPPEXA 2016-2019
...
View Book →
Language Technologies for the Challenges of the Digital Age
27th International Conference, GSCL 2017, Berlin, Germany, September 13-14, 2017, Proceedings...
View Book →
Optimization of system’s parameters for wavelength conversion of E-band signals
Current and future wireless communication systems are designed to achieve the user’s demands such as high data rate and high speed with low latency and simultaneously to save bandwidth and spectrum....
View Book →
TB3162 Vectored Interrupt Controller on 8-Bit PIC MCUs
First published in 2018...
View Book →
DTIC ADA129825: 2400- TO 800-B/S LPC (Linear Predictive Coder) Rate Converter.
This report presents a means for achieving an 800-bits per second (b/s) speech communication capability by redigitizing the linear predictive coefficients present in the 2400-b/s data stream produced ...
View Book →
Digital Video Concepts, Methods, and Metrics
Quality, Compression, Performance, and Power Trade-off Analysis...
View Book →
Sensitivity Analysis: Matrix Methods in Demography and Ecology
...
View Book →Image To Symbols Class
A technical report describing the algorithmic structure, mathematical properties, and information-theoretic implications of the ImageToSymbols class. The goal is to clarify how it converts a real-valu...
View Book →
Enhancing Future Skills and Entrepreneurship
3rd Indo-German Conference on Sustainability in Engineering...
View Book →
Algorithmic Graph Theory and Sage
...
View Book →
Multilinear PageRank
In this paper, we first extend the celebrated PageRank modification to a higher-order Markov chain. Although this system has attractive theoretical properties, it is computationally intractable for ma...
View Book →cray :: CFT :: SM-0017B CFT Internal Reference Jan86
From the bitsavers.org collection, a scanned-in computer-related document. cray :: CFT :: SM-0017B CFT Internal Reference Jan86...
View Book →
Biodiversity and Health in the Face of Climate Change
...
View Book →
Annotated Algorithms in Python
With applications in Physics, Biology, and Finance...
View Book →