by
Meyer-Baese, Uwe. author.
Format:
Electronic Resources
Excerpt:
implementation of these algorithms is critical and is the main goal of this book. It starts with an overview of
by
Vaudenay, Serge. author.
Format:
Electronic Resources
Excerpt:
Communications Security is designed for upper-level undergraduate and graduate-level students in computer science
View Other Search Results
by
Bose, Indranil, 1968-
Chapter PDFs via platform: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-148-3
Format:
Electronic Resources
Excerpt:
-- 2. Empirical Prediction of Computer-Network Evolution / Sami J. Habib -- 3. Suitability of IP
by
Staff, National Research Council.
Format:
Electronic Resources
Excerpt:
PARALLEL COMPUTING -- Applications -- Hardware Design -- Numerical Algorithms -- Learning New Modes of
by
Srikanthan, Thambipillai. editor.
Format:
Electronic Resources
Excerpt:
Real-Time Computer Control -- VLSI Performance Evaluation and Analysis of Systolic and Semisystolic Finite
Limit Search Results
Narrowed by: