Warning: file_put_contents(cache/omni_4249618eee13fd1bd74404de8337d8bb.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
PHP: The Right Way
Your guide to PHP best practices, coding standards, and authoritative tutorials...
View Book →
Digital Video Concepts, Methods, and Metrics
Quality, Compression, Performance, and Power Trade-off Analysis...
View Book →
The Big Book of Machine Learning Use Cases
Your complete how-to guide to putting ML to work - plus code samples and notebooks...
View Book →
Programming for Computations - Python
A Gentle Introduction to Numerical Simulations with Python 3.6...
View Book →DTIC ADA1046824: An Unsteady Taylor Angle Formula for Liner Collapse
An analytical formula for determining the direction of motion for an explosively driven metal liner under unsteady conditions is presented. This direction is defined by the angle delta between the vel...
View Book →
Code Club Book of Scratch
Simple coding for total beginners...
View Book →
Efficient Learning Machines
Theories, Concepts, and Applications for Engineers and System Designers...
View Book →
The Codes of the Street in Risky Neighborhoods
A Cross-Cultural Comparison of Youth Violence in Germany, Pakistan, and South Africa...
View Book →
Android Application Development for the Intel Platform
...
View Book →
Maharashtra GR: #201503191443500917
Maharashtra Government Resolution : Title : Grant released under National Vector Bourn Control Programme for Tribal Sub Plan. Department : Public Health Department Code : 201503191443500917 URL : gr.m...
View Book →Heat transfer parametric system identification
This work describes the development of a computer based model that would allow for determination of the transient thermal response characteristics of jet vanes of any size. The model used a thermal lu...
View Book →
DTIC ADA076836: Solar Energy Design Improvement: A Methodology for Hydronic Flat Plate Collector Sys
A methodology for solar energy system design improvement has been developed and coupled with a constrained function optimization code resulting in an automated solar energy system design procedure. Th...
View Book →
Linear Selection Indices in Modern Plant Breeding
...
View Book →
Clinical Text Mining
Secondary Use of Electronic Patient Records...
View Book →
Think Complexity
Complexity Science and Computational Modeling...
View Book →Design and Analysis of Quantization Based Low Bit Rate Encoding System
The objective of this paper is to develop a low bit rate encoding for VQ problems such as real time image coding.. The decision tree is generated by an offline process.. A new systolic architecture to...
View Book →
Optimizing software in C++
An optimization guide for Windows, Linux and Mac platforms...
View Book →
Coffee Break Python Slicing
24 Workouts to Master Slicing in Python, Once and for All...
View Book →Blind Deconvolution using Convex Programming
We consider the problem of recovering two unknown vectors, $\w$ and $\x$, of length $L$ from their circular convolution. We make the structural assumption that the two vectors are members of known sub...
View Book →NASA Technical Reports Server (NTRS) 20020045219: Efficacy of Code Optimization on Cache-based Proce
The current common wisdom in the U.S. is that the powerful, cost-effective supercomputers of tomorrow will be based on commodity (RISC) micro-processors with cache memories. Already, most distributed ...
View Book →
Exploring .NET Core
with Microservices, ASP.NET Core, and Entity Framework Core...
View Book →
Embedded Firmware Solutions
Development Best Practices for the Internet of Things...
View Book →
The Privacy Engineer's Manifesto
Getting from Policy to Code to QA to Value...
View Book →Convective Properties of Rotating Two-Dimensional Core-Collapse Supernova Progenitors
We explore the effects of rotation on convective carbon, oxygen, and silicon shell burning during the late stages of evolution in a 20Msun star. Using the Modules for Experiments in Stellar Astrophysi...
View Book →
RESTful Web Services
Web Services for the Real World...
View Book →
25 Secrets for Faster ASP.NET Applications
...
View Book →
Solving PDEs in Python
The FEniCS Tutorial I...
View Book →
Philco READ, Real time electronic access and display - Philco:
Philco READ, Real time electronic access and display - Philco...
View Book →
Getting Started with InnerSource
Keys to collaboration and productivity inside your company...
View Book →
Code the Classics
Volume 1...
View Book →
The Coder's Apprentice
Learning Programming with Python 3...
View Book →
Intel Xeon Phi Coprocessor Architecture and Tools
The Guide for Application Developers...
View Book →NASA Technical Reports Server (NTRS) 19880011732: Numerical analysis of three-dimensional viscous in
A 3-D Navier-Stokes code has been developed for analysis of turbomachinery blade rows and other internal flows. The Navier-Stokes equations are written in a Cartesian coordinate system rotating about ...
View Book →DTIC ADA265004: Heterogeneous SuperConcurrent Parallelism (HeSCP)
HeSCP (Heterogeneous SuperConcurrent Parallelism, pronounced 'hee- skip') is the tuned use of diverse processors to solve distinct computational needs, in which codes or code portions are directed to ...
View Book →
A Practical Guide to TPM 2.0
Using the New Trusted Platform Module in the New Age of Security...
View Book →
Pro TBB
C++ Parallel Programming with Threading Building Blocks...
View Book →
Analysis for Computer Scientists
Foundations, Methods, and Algorithms...
View Book →
Foundations of Machine Learning
...
View Book →DTIC ADA130182: Evaluation of Fourier Descriptors for Target Recognition in Digital Imagery.
This report describes the mathematical processes involved in generating co-efficients from a binary image of an object. It includes fourier descriptor theory, the normalized fourier descriptor, descri...
View Book →
Jenkins: The Definitive Guide
Continuous Integration for the Masses...
View Book →
Think Raku (Think Perl 6)
How to Think Like a Computer Scientist...
View Book →
Finite Difference Computing with PDEs
A Modern Software Approach...
View Book →
Equitable Research Partnerships
A Global Code of Conduct to Counter Ethics Dumping...
View Book →
Android on x86
An Introduction to Optimizing for Intel Architecture...
View Book →DTIC ADA202657: A Vectorized Hidden-Surface Algorithm Implemented on the Cray-2 Supercomputer
Recent developments in scientific computing have prompted the need for supercomputer graphics research. These developments include the requirement to visualize large amounts of data which are processe...
View Book →
Data Parallel C++
Mastering DPC++ for Programming of Heterogeneous Systems using C++ and SYCL...
View Book →
Modern Mainframe Development
COBOL, Databases, and Next-Generation Approaches...
View Book →
Programming Persistent Memory
A Comprehensive Guide for Developers...
View Book →
DTIC ADA487015: Applying Frequency-Domain Equalization to Code-Division Multiple Access and Transfor
This research examined the theory and application of using discrete multi-tone (DMT) frequency-domain equalization (FEQ) with communications systems that inherently possess null-tones in their respect...
View Book →
cray :: CRAY X-MP :: HR-0032 CRAY X-MP Series Model 22 24 Mainframe Ref Man Jul84
From the bitsavers.org collection, a scanned-in computer-related document. cray :: CRAY X-MP :: HR-0032 CRAY X-MP Series Model 22 24 Mainframe Ref Man Jul84...
View Book →
DevOps for Digital Leaders
Reignite Business with a Modern DevOps-Enabled Software Factory...
View Book →
Optimizing HPC Applications with Intel Cluster Tools
Hunting Petaflops...
View Book →
NASA Technical Reports Server (NTRS) 20040081254: Application of Polarization to the MODIS Aerosol R
Reflectance measurements in the visible and infrared wavelengths, from the Moderate Resolution Imaging Spectroradiometer (MODIS), are used to derive aerosol optical thicknesses (AOT) and aerosol prope...
View Book →Cloud Radio-Multistatic Radar: Joint Optimization of Code Vector and Backhaul Quantization
A multistatic radar set-up is considered in which distributed receive antennas are connected to a Fusion Center (FC) via limited-capacity backhaul links. Similar to cloud radio access networks in comm...
View Book →
Ruby Best Practices
Increase Your Productivity - Write Better Code...
View Book →
Hacking Portugal
Making Portugal a global player in Software Development...
View Book →Speculative Segmented Sum for Sparse Matrix-Vector Multiplication on Heterogeneous Processors
Sparse matrix-vector multiplication (SpMV) is a central building block for scientific software and graph applications. Recently, heterogeneous processors composed of different types of cores attracted...
View Book →
Programming Computer Vision with Python
Tools and algorithms for analyzing images...
View Book →
Rhetorical Code Studies
Discovering Arguments in and around Code...
View Book →
PivotCompress: Compression by Sorting
Sorted data is usually easier to compress than unsorted permutations of the same data. This motivates a simple compression scheme: specify the sorted permutation of the data along with a representatio...
View Book →DTIC ADA273089: Toward a New Method of Decoding Algebraic Codes Using Groebner Bases
A binary BCH error control code is a vector subspace of binary N- tuples. Algebraically, the code is generated by a polynomial having binary coefficients and roots in GF(2m). It is decoded by computin...
View Book →
Statistics with Julia
Fundamentals for Data Science, Machine Learning and Artificial Intelligence...
View Book →
10 PRINT CHR$(205.5+RND(1)); : GOTO 10
A single line of code offers a way to understand the cultural context of computing...
View Book →
Error-Correction Coding and Decoding
Bounds, Codes, Decoders, Analysis and Applications...
View Book →