Warning: file_put_contents(cache/omni_9043fb4cc64992ca66f59dfb6a3072ba.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
DevOps for Digital Leaders
Reignite Business with a Modern DevOps-Enabled Software Factory...
View Book →
Analysis for Computer Scientists
Foundations, Methods, and Algorithms...
View Book →
Foundations of Quantum Theory
From Classical Concepts to Operator Algebras...
View Book →CIA Reading Room cia-rdp88-00733r000100150007-1: SCIENCE AND TECHNOLOGY PERSPECTIVES
Declassified in Part - Sanitized Copy Approved for Release 2012/06/04: CIA-RDP88-00733R000100150007-1 For Official Use Only 30 September 1986 Vol. 1, No. 9 Science and Technology Perspectives (Brazil)...
View Book →
Fundamentals of Biomechanics
Equilibrium, Motion, and Deformation...
View Book →
Language Technologies for the Challenges of the Digital Age
27th International Conference, GSCL 2017, Berlin, Germany, September 13-14, 2017, Proceedings...
View Book →
EIE: Efficient Inference Engine on Compressed Deep Neural Network
State-of-the-art deep neural networks (DNNs) have hundreds of millions of connections and are both computationally and memory intensive, making them difficult to deploy on embedded systems with limite...
View Book →
Niche Wars
Australia in Afghanistan and Iraq, 2001-2014...
View Book →
Pro TBB
C++ Parallel Programming with Threading Building Blocks...
View Book →
Annotated Algorithms in Python
With applications in Physics, Biology, and Finance...
View Book →
Clinical Text Mining
Secondary Use of Electronic Patient Records...
View Book →
DTIC ADA278346: Measurements of Coastal Currents Using a Ship Based VHF Radar System
The University of Miami Ocean Surface Current Radar (OSCR) is a pulsed radar which utilizes a Yagi transmit antenna and a phased, line array receive antenna. In its VHF (50 MHz) mode of operation, the...
View Book →
Understanding Machine Learning
From Theory to Algorithms...
View Book →
Model-Driven Development and Operation of Multi-Cloud Applications
The MODAClouds Approach...
View Book →
Russia's Turn to the East
Domestic Policymaking and Regional Cooperation...
View Book →
CIA Reading Room cia-rdp90t00155r000500030009-7: STRENGTHENING CONVENTIONAL DETERRENCE IN EUROPE
Declassified and Approved For Release 2011/12/07 :CIA-RDP90T00155R000500030009-7 Strengthening Conventional Deterrence in Europe A Program for the 1980s European Security Study Report of the Special P...
View Book →
Bayesian Methods in the Search for MH370
...
View Book →
Sensitivity Analysis: Matrix Methods in Demography and Ecology
...
View Book →
Ionospheric Multi-Spacecraft Analysis Tools
Approaches for Deriving Ionospheric Parameters...
View Book →
Variant Construction from Theoretical Foundation to Applications
...
View Book →
Building a Virtualized Network Solution
Microsoft System Center...
View Book →
The Fast Norm Vector Indicator (FNVI) method: A new dynamical parameter for detecting order and chao
In the present article, we introduce and also deploy a new, simple, very fast and efficient method, the Fast Norm Vector Indicator (FNVI) in order to distinguish rapidly and with certainty between ord...
View Book →
Problems in Classical Electromagnetism
157 Exercises with Solutions...
View Book →
Building Secure and Reliable Systems
Best Practices for Designing, Implementing, and Maintaining Systems...
View Book →DTIC ADA487736: Quantification of Rock Damage from Small Explosions and its Effect on Shear-Wave Gen
We are currently conducting a one-year feasibility study to determine the most efficient way to characterize the damage from an explosive source and to identity the source(s) of shear wave generation....
View Book →
Physical (A)Causality
Determinism, Randomness and Uncaused Events...
View Book →
Solving PDEs in Python
The FEniCS Tutorial I...
View Book →
Digital Video Concepts, Methods, and Metrics
Quality, Compression, Performance, and Power Trade-off Analysis...
View Book →
Foundations of Machine Learning
...
View Book →NASA Technical Reports Server (NTRS) 19980219481: [MODIS Investigation]
The objective of the last six months were: (1) Continue analysis of Hawaii Ocean Time-series (HOT) bio-optical mooring data, and Southern Ocean bio-optical drifter data; (2) Complete development of do...
View Book →CIA Reading Room cia-rdp93t00451r000100010001-9: PROSPECTS FOR BALLISTIC MISSILE PROLIFERATION
Declassified in Part- Sanitized Copy Approved for Release 2013/07/02: CIA-RDP93T00451R000100010001-9 Director of Central Intelligence Secret 50-52 EXTRAS/CB ? 25X1 Prospects for Ballistic Missile Prol...
View Book →
CI/CD with Docker and Kubernetes
How to Deliver Cloud Native Applications at High Velocity...
View Book →Analytical Review Article of the Dorian Codex Protocol for Artificial Intelligence - Hamiltonian The
{ "@context": "https://schema.org", "@type": "CreativeWork", "name": "Dorian Codex Protocol for AI", "author": { "@type": "Person", "name": "Stefano Dorian Franco", "iden...
View Book →
Programming for Computations - Python
A Gentle Introduction to Numerical Simulations with Python 3.6...
View Book →
Cloud Native DevOps with Kubernetes
Building, Deploying, and Scaling Modern Applications in the Cloud...
View Book →
Ambisonics
A Practical 3D Audio Theory for Recording, Studio Production, Sound Reinforcement, and Virtual Reality...
View Book →
Clawdbot Openclaw The Local First AI Agent Handbook Build, Host, And Secure Your Own Private AI Assi
Clawdbot Openclaw The Local First AI Agent Handbook: Build, Host, and Secure Your Own Private AI Assistant (The OpenClaw Local Intelligence Series: Clawdbot, Openclaw, Molbot, Molbook Book 1) Stop Ren...
View Book →
Optimizing HPC Applications with Intel Cluster Tools
Hunting Petaflops...
View Book →57 32469Enhanced website phishing detection based on the cyber kill chain and cloud computing
Crimeware-as-a-service (CaaS) presents a growing cybersecurity threat by facilitating the acquisition of tools for website phishing attacks. Detecting these attacks requires effective techniques to ob...
View Book →CIA Reading Room cia-rdp90b00184r000100080001-0: BLUE GULL HANDBOOK
Declassified in Part - Sanitized Copy Approved for Release 2012/06/14: CIA-RDP90B00184R000100080001-0 TABLE OF CONTENTS Page INTRODUCTION PHASE I (T-2 TRAINING) PHASE II (U-2 FCLP) 1 2 5 PHASE III (1....
View Book →
Signal Computing
Digital Signals in the Software Domain...
View Book →Iterative Alternating Neural Attention for Machine Reading
We propose a novel neural attention architecture to tackle machine comprehension tasks, such as answering Cloze-style queries with respect to a document. Unlike previous models, we do not collapse the...
View Book →
Finite Difference Computing with PDEs
A Modern Software Approach...
View Book →
One Hundred Years of Chemical Warfare: Research, Deployment, Consequences
...
View Book →
Data Parallel C++
Mastering DPC++ for Programming of Heterogeneous Systems using C++ and SYCL...
View Book →
Biodiversity and Health in the Face of Climate Change
...
View Book →
Error-Correction Coding and Decoding
Bounds, Codes, Decoders, Analysis and Applications...
View Book →NASA Technical Reports Server (NTRS) 20130009519: Post-Flight EDL Entry Guidance Performance for the
Mars Science Laboratory landed Curiosity in Gale Crater on 5 Aug 2012. Curiosity landed successfully only 2.2 km away from the expected target given the onboard navigation state. Better than the avera...
View Book →
NASA Technical Reports Server (NTRS) 20130003311: Orion Exploration Flight Test-1 Contingency Drogue
As a backup to the GPS-aided Kalman filter and the Barometric altimeter, an "adjusted" velocity trigger is used during entry to trigger the chain of events that leads to drogue chute deploy for the Or...
View Book →
Configuring Microsoft SharePoint Hybrid Capabilities
...
View Book →
Configuration Manager Field Experience
Microsoft System Center...
View Book →
Optimizing software in C++
An optimization guide for Windows, Linux and Mac platforms...
View Book →
Linear Selection Indices in Modern Plant Breeding
...
View Book →
Intel Xeon Phi Coprocessor Architecture and Tools
The Guide for Application Developers...
View Book →CIA Reading Room cia-rdp78t05439a000400080067-0: EVALUATIONS OF SOVIET SURFACE-TO-SURFACE MISSILE DE
Declassified in Part - Sanitized Copy Approved for Release 2012/06/04: CIA-RDP78TO5439A000400080067-0 Iq Next 10 Page(s) In Document Denied ILLEGIB Declassified in Part - Sanitized Copy Approved for R...
View Book →
Jenkins: The Definitive Guide
Continuous Integration for the Masses...
View Book →
Heterogeneity, High Performance Computing, Self-Organization and the Cloud
...
View Book →
CIA Reading Room cia-rdp78t05162a000500010030-3: SOVIET TACTICAL AIR SIGNAL UNITS
Sanitized Copy Approved for Release 2011/06/20: CIA-RDP78TO5162A000500010030-3 Top Secret PHOTOGRAPHIC I NTERPRETATION REPORT NATIONAL PHOTOGRAPHIC INTERPRETATION CENTER SOVIET TACTICAL AIR SIGNAL UNI...
View Book →
Sensor Technologies
Healthcare, Wellness, and Environmental Applications...
View Book →
Managing Cloud Native Data on Kubernetes
Architecting Cloud Native Data Services Using Open Source Technology...
View Book →DTIC AD1002585: Online Normalization Algorithm for Engine Turbofan Monitoring
To understand the behavior of a turbofan engine, one first needs to deal with the variety of data acquisition contexts. Each time a set of measurements is acquired, and such set may account for tens o...
View Book →
Interface Oral Health Science 2016
Innovative Research on Biosis–Abiosis Intelligent Interface...
View Book →
SQL Server Source Control Basics
...
View Book →Measured pressure distributions inside nonaxisymmetric nozzles with partially deployed thrust revers
First published in 1987...
View Book →
Word Sentiment Analysis using Natural Language Processing Based Techniques
This project will deploy sentiment analysis, a major sector of Natural Language Processing NLP , to develop a system that will find the emotions in text based data. This system will categorize the tex...
View Book →
Deploying Windows 10
Automating deployment by using System Center Configuration Manager...
View Book →
Intelligent Human Computer Interaction
9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017, Proceedings...
View Book →
Kubernetes for Full-Stack Developers
...
View Book →
Enhanced Living Environments
Algorithms, Architectures, Platforms, and Systems...
View Book →
Anti-mosquito plants as an alternative or incremental method for malaria vector control among rural
This article is from Journal of Ethnobiology and Ethnomedicine , volume 10 . Abstract Background: Plants represent one of the most accessible resources available for mosquito control by communities in...
View Book →
Efficient Learning Machines
Theories, Concepts, and Applications for Engineers and System Designers...
View Book →