Search Results - "computation"
Suggested Topics within your search.
Suggested Topics within your search.
- History 3,096
- Education 2,915
- Politics & government 2,795
- Technology: general issues 2,567
- Literature: history & criticism 2,547
- Sociology 2,535
- Medicine 2,362
- linguistics 2,344
- Research & information: general 2,212
- European history 2,002
- Biography & True Stories 1,994
- Literature & literary studies 1,914
- Humanities 1,808
- History of engineering & technology 1,807
- Society & social sciences 1,770
- Media studies 1,728
- Philosophy 1,627
- Social & cultural history 1,467
- Social & cultural anthropology, ethnography 1,449
- Biology, life sciences 1,418
- Political science & theory 1,406
- Science: general issues 1,328
- History of the Americas 1,247
- Literary studies: general 1,240
- Law 1,166
- Society & culture: general 1,162
- Archaeology 1,156
- International relations 1,145
- Cultural studies 1,135
- Gender studies, gender groups 1,078
-
261
-
262
-
263
Boundary Layer Flows Modelling, Computation, and Applications of Laminar, Turbulent Incompressible and Compressible Flows
Published 2023Subjects: “…computational fluid dynamics…”
DOAB: download the publication
DOAB: description of the publication
Electronic Book Chapter -
264
-
265
-
266
-
267
-
268
-
269
-
270
-
271
-
272
Security of Ubiquitous Computing Systems Selected Topics /
Published 2021Table of Contents: “…Part I: Introduction -- Emerging Security Challenges for Ubiquitous Devices -- Part II: Lightweight Cryptographic Primitives -- Catalog and Illustrative Examples of Lightweight Cryptographic Primitives -- Selected Design and Analysis Techniques in Contemporary Symmetric Encryption -- An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families -- Part III: Authentication Protocols -- ePassport and eID Technologies -- Ultra-lightweight Authentication -- From Relay Attacks to Distance-Bounding Protocols -- Part IV: Hardware Implementation and Systems -- It Started With Templates: The Future of Profiling in Side-Channel Analysis -- Side Channel Attack Assessment Platforms and Tools for Ubiquitous Systems -- Challenges in Certifying Small-scale (IoT) Hardware Random Number Generators -- Finding Software Bugs in Embedded Devices -- Part V: Privacy and Forensics -- Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach -- IoT Forensics.…”
Link to Metadata
Electronic eBook -
273
Quantum Computing for the Quantum Curious
Published 2021Subjects: “…Quantum computers.…”
Link to Metadata
Electronic eBook -
274
Security in Computer and Information Sciences Second International Symposium, EuroCybersec 2021, Nice, France, October 25-26, 2021, Revised Selected Papers /
Published 2022Subjects: “…Computer networks .…”
Link to Metadata
Electronic eBook -
275
Programming for Computations - MATLAB/Octave A Gentle Introduction to Numerical Simulations with MATLAB/Octave /
Published 2016Table of Contents: “…Preface -- The first few steps -- Basic constructions -- Computing integrals -- Solving ordinary differential equations -- Solving partial differential equations -- Solving nonlinear algebraic equations -- References -- Index.…”
Link to Metadata
Electronic eBook -
276
Finite Difference Computing with PDEs A Modern Software Approach /
Published 2017Subjects: “…Computer science Mathematics.…”
Link to Metadata
Electronic eBook -
277
Intelligent Human Computer Interaction 9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017, Proceedings /
Published 2017Table of Contents: “…Optimizing User Interfaces for Human Performance -- Geometrical Shapes Rendering on a Dot-Matrix Display -- Dynamic Hand Gesture Recognition for Mobile Systems Using Deep LSTM -- Adjustable Autonomy for UAV Supervision Applications Through Mental Workload Assessment Techniques -- Classification of Motor Imagery Based EEG Signals Using Sparsity Approach -- Mental Workload Assessment for UAV Traffic Control Using Consumer-Grade BCI Equipment -- Improving Classification Performance by Combining Feature Vectors with A Boosting Approach for Brain Computer Interface (BCI) -- List Navigation Using Edge Menu -- Simplexity and Vicariance. …”
Link to Metadata
Electronic eBook -
278
Security in Computer and Information Sciences First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers /
Published 2018Subjects: “…Data encryption (Computer science).…”
Link to Metadata
Electronic eBook -
279
Making Presentation Math Computable A Context-Sensitive Approach for Translating LaTeX to Computer Algebra Systems /
Published 2023Subjects: “…Computational intelligence.…”
Link to Metadata
Electronic eBook -
280
A Primer for Computational Biology
Published 2017Subjects: “…Computer Science Textbooks…”
Access online version
Electronic eBook