Our website is made possible by displaying online advertisements to our visitors.
Please consider supporting us by disabling your ad blocker.

Download links will be available after you disable the ad blocker and reload the page.
Showing: 1-10 results of 1174

Practical 3D physics simulation experience with modern feature-rich graphics and physics APIs Overview Create your own physics simulations and understand the various design concepts of modern games Build a real-time complete game application, implementing 3D graphics and physics entirely from scratch Learn the fundamental and advanced concepts of game programming using step-by-step instructions and examples In... more...

Internet-scale computing—popularly known as big data—has more disruptive potential than any information technology in the past 40 years. As author Jeffrey Needham points out in this eye-opening book, big data can provide unprecedented insight into user habits, giving enterprises a huge market advantage. It will also inspire organizations to change the way they function. Disruptive Possibilities: How Big... more...

Learn how to apply rough-fuzzy computing techniques to solve problems in bioinformatics and medical image processing Emphasizing applications in bioinformatics and medical image processing, this text offers a clear framework that enables readers to take advantage of the latest rough-fuzzy computing techniques to build working pattern recognition models. The authors explain step by step how to integrate rough sets with fuzzy sets in order... more...

This accessible textbook presents a fascinating review of cryptography and cryptanalysis across history. The text relates the earliest use of the monoalphabetic cipher in the ancient world, the development of the “unbreakable” Vigenère cipher, and an account of how cryptology entered the arsenal of military intelligence during the American Revolutionary War. Moving on to the American Civil War, the book explains how the Union... more...

Among the group of physics honors students huddled in 1957 on a Colorado mountain watching Sputnik bisect the heavens, one young scientist was destined, three short years later, to become a key player in America’s own top-secret spy satellite program. One of our era’s most prolific mathematicians, Karl Gustafson was given just two weeks to write the first US spy satellite’s software. The project would fundamentally alter America’s Cold War... more...


The use of mobile communication devices has grown phenomenally throughout the world during the last few years. With strong consumer demand to increase data delivery (large emails, browsing the Internet on wireless devices, transferring video images, etc.), engineers are faced with the challenge of enhancing CDMA to provide larger data capabilities while improving voice signals for clearer reception. In November 2001 the U.S. Federal Communications... more...

Presents main concepts of mobile communication systems, both analog and digital Introduces concepts of probability, random variables and stochastic processes and their applications to the analysis of linear systems Includes five appendices covering Fourier series and transforms, GSM cellular systems and more

Alan Mathison Turing (1912-1954) made major contributions to several areas of science. Today his name is mentioned frequently in philosophical discussions about the nature of Artificial Intelligence. He was a pioneer researcher in computer architecture and software engineering - his work in pure mathematics and mathematical logic extended considerably further. His last work was "On Morphogenesis in Plants". Turing was one of the leading figures in 20th... more...

This book constitutes the refereed proceedings of the 13th International Conference on Information and Communications Security, ICICS 2011, held in Beijing, China, in November 2011. The 33 revised full papers presented together with an invited talk were carefully reviewed and selected from 141 submissions. The papers are organized in topical sections on digital signatures, public key encryption, cryptographic protocols, applied cryptography, multimedia... more...

This book constitutes the revised selected papers of the 20th International Workshop on Combinatorial Algorithms, held in June/July 2009 in the castle of Hradec nad Moravicí, Czech Republic. The 41 papers included in this volume together with 5 invited papers were carefully reviewed and selected from over 100 submissions. The topics dealt with are algorithms and data structures, applications, combinatorial enumeration, combinatorial optimization,... more...