Navigation bar
  Start Previous page
 14 of 106 
Next page End 9 10 11 12 13 14 15 16 17 18 19  

— Illustrates the distribution theory of sorting using a broad array of both
classical and modern techniques
— Features a variety of end-of-chapter exercises
Password: www.AvaxHome.ru
_
Nevio Benvenuto, Giovanni Cherubini, "Algorithms for Communications Systems and
their Applications"
John Wiley & Sons | ISBN 0470843896 | 2002 Year | DjVu | Mb | 1318 Pages
“ This volume presents the logical arithmetical or computational procedures
within communications systems that will ensure the solution to various problems.
The authors comprehensively introduce the theoretical elements that are at the
basis of the field of algorithms for communications systems. Various
applications of these algorithms are then illustrated with particular attention
to wired and wireless network access technologies.
— Provides a complete treatment of algorithms for communications systems, rarely
presented together
— Introduces the theoretical background to digital communications and signal
processing
— Features numerous applications including advanced wireless modems and echo
cancellation techniques
— Includes useful reference lists at the end of each chapter
Graduate students in the fields of Telecommunications and Electrical Engineering
Researchers and Professionals in the area of Digital Communications, Signal
Processing and Computer Engineering will find this book invaluable.
Password: www.AvaxHome.ru
_
Eric C.R. Hehner, "A Practical Theory of Programming" (2nd edition)
Springer | ISBN 0387941061 | 2004 Year | PDF | Mb | 243 Pages
“ Understanding programming and programming languages requires knowledge of the
underlying theoretical model. This book explores aspects of programming that are
amenable to mathematical proof. The author describes a programming theory which
is much simpler and more comprehensive than the current theories to date. In the
theoretical model, a specification is just a boolean expression and refinement
is just an ordinary implication. The author develops a practical and broad
method for writing precise specifications and designing programs whose
executions probably satisfy the specifications. Beginning with preparatory
material in logic, numbers, sets, lists, functions and relations, the book
advances further into program theory, the heart of the book. Subsequent chapters
may be selected or omitted according to course emphasis. The text will be useful
to students in courses on programming methodology or verification at the
advanced undergraduate or beginning graduate level, as well as for software
engineers in the field. All technical terms are explained and then demonstrated
in the book wherever possible. No advanced mathematical knowledge or programming
language is assumed. The book contains numerous exercises and worked-out
solutions for specific exercises. Transparency masters and solutions for the
remaining exercises are available from the author.
Password: www.AvaxHome.ru
_
Mel Schwartz, "Encyclopedia of Smart Materials. 2 Volume Set"
Wiley-Interscience | ISBN 0471177806 | 2001 Year | PDF | 20,1 Mb | 1200 Pages
“ “ "The contents of this encyclopedia will not fail to meet expectations of
readers.... I strongly recommend this encyclopedia to researchers..."
(Pharmaceutical Research, Vol. 19, No. 12, December
2002)
"...written throughout at a high intellectual level and covering an impressive
range of themes..."
(Intermetallics, No.11, 2003)
"...the actual content of the work is prodigious…a rich collection of detail
knowledge and general information..."
(Journal of Materials Technology, March 2003)
"...a key reference, providing a broad and accessible description of a complex
and growing interdisciplinary field…recommended..."
(Choice, Vol. 40, No. 8, April 2003)
"...an interesting compendium of smart materials...the wide use of polymers,
which is of interest to our readers, is discussed throughout...useful..."
(Polymer News)
Password: www.AvaxHome.ru
_
James Larminie, John Lowry, "Electric Vehicle Technology Explained"
John Wiley & Sons | ISBN 0470851635 | 2003 Year | PDF | 5,23 Mb | 314 Pages
“ While the classic battery electric car continues to make only a small impact
on the automobile market, other types of electric vehicle, especially hybrids,
have made significant and promising improvements. Moreover, small battery
electric vehicles such as bicycles and mobility aids are also developing well.
Presenting more than 160 diagrams and pictures, this book explains the science
and technology behind these important developments, and also introduces the
issues that underpin the design and performance modelling of electric vehicles.
Electric Vehicle Technology Explained:
— Encompasses a full range of electric vehicles: bicycles, mobility aids,
delivery vehicles and buses – not just cars.
— Covers all the basic technology relating to electric road vehicles –
batteries, super capacitors, flywheels, fuel cells, electric motors and their
controllers, and system design.
— Considers the environmental benefits and disadvantages of electric vehicles
and their component devices.
— Includes case studies of a range of batteries, hybrids and fuel cell powered
vehicles, from bicycles to buses.
— Offers many MATLAB® examples explaining the design of appropriate computer
prediction models.
Professionals, researchers and engineers in the electric vehicle industry as
well as advanced students in electrical and mechanical engineering will benefit
from this comprehensive coverage of electric vehicle technology.
Password: www.AvaxHome.ru
_
Bill McCarty, "SELinux: NSA's Open Source Security Enhanced Linux"
O'Reilly Media, Inc. | ISBN 0596007167 | 2004 Year | CHM | 1,1 Mb | 254 Pages
“ The intensive search for a more secure operating system has often left
everyday, production computers far behind their experimental, research cousins.
Now SELinux (Security Enhanced Linux) dramatically changes this. This best-known
and most respected security-related extension to Linux embodies the key advances
of the security field. Better yet, SELinux is available in widespread and
popular distributions of the Linux operating system — including for Debian,
Fedora, Gentoo, Red Hat Enterprise Linux, and SUSE — all of it free and open
source.
SELinux emerged from research by the National Security Agency and implements
classic strong-security measures such as role-based access controls, mandatory
access controls, and fine-grained transitions and privilege escalation following
the principle of least privilege. It compensates for the inevitable buffer
overflows and other weaknesses in applications by isolating them and preventing
flaws in one application from spreading to others. The scenarios that cause the
most cyber-damage these days--when someone gets a toe-hold on a computer through
a vulnerability in a local networked application, such as a Web server, and
parlays that toe-hold into pervasive control over the computer system — are
prevented on a properly administered SELinux system.
The key, of course, lies in the words "properly administered." A system
administrator for SELinux needs a wide range of knowledge, such as the
principles behind the system, how to assign different privileges to different
groups of users, how to change policies to accommodate new software, and how to
log and track what is going on. And this is where SELinux is invaluable. Author
Bill McCarty, a security consultant who has briefed numerous government
agencies, incorporates his intensive research into SELinux into this small but
information-packed book. Topics include:
— A readable and concrete explanation of SELinux concepts and the SELinux
security model
— Installation instructions for numerous distributions
— Basic system and user administration
— A detailed dissection of the SELinux policy language
Examples and guidelines for altering and adding policies
Password: www.AvaxHome.ru
_
Yali Amit, "2D Object Detection and Recognition: Models, Algorithms, and
Networks"
The MIT Press | ISBN 0262011948 | 2002 Year | DjVu | 3,82 Mb | 324 Pages
“ Two important subproblems of computer vision are the detection and recognition
of 2D objects in gray-level images. This book discusses the construction and
training of models, computational approaches to efficient implementation, and
parallel implementations in biologically plausible neural network architectures.
The approach is based on statistical modeling and estimation, with an emphasis
on simplicity, transparency, and computational efficiency.
The book describes a range of deformable template models, from coarse sparse
models involving discrete, fast computations to more finely detailed models
based on continuum formulations, involving intensive optimization. Each model is
defined in terms of a subset of points on a reference grid (the template), a set
of admissible instantiations of these points (deformations), and a statistical
model for the data given a particular instantiation of the object present in the
image. A recurring theme is a coarse to fine approach to the solution of vision
problems. The book provides detailed descriptions of the algorithms used as well
as the code, and the software and data sets are available on the Web.
Previous page Top Next page