Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
The internet has changed perceptions of privacy, criminality and ownership this book questions whether the underlying legal concepts should also change.This book was published as a special issue of International review of Law Computers and Technology.
The book provides a fast track to understanding the Riemann Mapping Theorem. The Dirichlet and Neumann problems for the Laplace operator are solved, the Poisson kernel is constructed, and the inhomogenous Cauchy-Reimann equations are solved concretely and efficiently using formulas stemming from the Kerzman-Stein result. Also, four new chapters
In this edited collection, the new science of complexity is explained and illustrated through the journeys of 9 leading scholars who have applied it in fields such as psychology, social change, Buddhism, creativity, and future studies.This book was originally published as a special issue of World Futures.
This book discusses managing SOPs for GCP from conception to retirement. It recommends approaches that have a direct impact on improving SOP and regulatory compliance. Throughout the text, the book provides a user's point of view to keep topics focused on the practical aspects of SOPs and SOP management.
This book provides a pioneering and provocative exploration of the rich synergies between adaptation studies and translation studies and is the first genuine attempt to discuss the rather loose usage of the concepts of translation and adaptation in terms of theatre and film.
In the last twenty years, dynamic prediction models have been extensively used to monitor patient prognosis in survival analysis. Written by one of the pioneers in the area, this book synthesizes these developments in a unified framework. It covers a range of models, including prognostic and dynamic prediction of survival using genomic data and
Written for those with a basic understanding of map making, but without knowledge of Web design, this textbook explains how to create effective interaction, animation, and layouts for maps to put online or into a mobile platform. Concept driven and product free, this reference emphasizes cartographic principles for Web and mobile map design over
Multiple factor analysis (MFA) enables users to analyze tables of individuals and variables in which the variables are structured into quantitative, qualitative, or mixed groups. Written by the co-developer of the methodology, this book brings together the theoretical and methodological aspects of MFA. It also covers principal component analysis
This volume serves as an overview of the application of discovery tools in an academic setting. It is geared to librarians who are considering the implementation of such a tool.This book was published as a special triple issue of College & Undergraduate Libraries.
The first complete text suitable for use in introductory Business Analytics courses, this book establishes a national syllabus for an emerging first course at an MBA level. There are three levels of knowledge that those who work with business analytics need to understand: encoding, solution design, and analytics: post-solution analysis. This boo
This text is designed for a one-semester course in optimization taken by advanced undergraduate and beginning graduate students in the mathematical sciences and engineering. It teaches students the basics of continuous optimization and helps them better understand the mathematics from previous courses. The book focuses on general problems and th
This volume looks at current and emerging technologies of war and some of the ethical issues surrounding their use. It discusses current thought on ethics and emerging technologies from internationally-recognized scholars addressing the full spectrum of issues in present warfare technology.This book was originally published in v
Combinatory logic is a versatile field that is connected to philosophical, mathematical, and computational logic. This comprehensive reference on combinatory logic covers results in the field from the last four decades along with classical information on the topic. The author makes combinatory logic simple to understand while providing working k
Although sequent calculi constitute an important category of proof systems, they are not as well known as axiomatic and natural deduction systems. Addressing this deficiency, this book presents a comprehensive treatment of sequent calculi, including a wide range of variations. It focuses on sequent calculi for various non-classical logics, from
Clustering remains a vibrant area of research in statistics. Although there are many books on this topic, there are relatively few that are well founded in the theoretical aspects. This book presents an overview of the theory and applications of probabilistic clustering and variable selection, synthesizing the key research results of the last 50
This book combines the materials from introductory numerical methods and introductory optimization courses into a single text. This classroom-tested approach enriches a standard numerical methods syllabus with optional chapters on numerical optimization and provides a valuable numerical methods background for students taking an introductory opti
This book presents results established over the past 40 years on Laplacian matrices of graphs developed using combinatorial matrix theory. The author focuses on the spectrum of Laplacian matrices, the algebraic connectivity of graphs, associated eigenvectors of the Laplacian matrix, and submatrices of the Laplacian matrix. All of these topics il
Pattern theory is a field in applied mathematics that analyzes all types of signals that the world presents to us. For each chapter, the authors present a real-world problem - a class of signals that we want to model. Then they present the basic mathematical tools needed before moving into the model. Then the model is compared with the original
Bringing the material up to date to reflect modern applications, this second edition has been completely rewritten and reorganized to incorporate a new style, methodology, and presentation. It offers a more complete and involved treatment of Galois theory, a more comprehensive section on Pollard's cubic factoring algorithm, and more detailed exp
This handbook is a source of information for the discipline of cybersecurity from a human factors perspective. It is an important and valuable resource for IT specialists, as well as other disciplines such as psychology, behavioral science, software engineering, and security management.
This text illustrates algorithms and cryptosystems using examples and the open-source computer algebra system of Sage. It enables students to run their own programs and develop a deep and solid understanding of the mechanics of cryptography. The author, a noted educator in the field, covers the methods, algorithms, and applications of modern cry
This volume provides comprehensive coverage of the state of the art in simulation conceptual modeling. The first section of the text discusses the purpose and requirements of a conceptual model. The next set of chapters provides frameworks and tools for conceptual modeling. The book then describes the use of soft systems methodology for model st
This useful handbook elucidates the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework of financial cryptography. It applies various cryptographic techniques to auctions, electronic voting, micropayment systems, digital rights, financial portfolios, routing networks, and more. The boo
This self-contained introduction provides a focused tour of the central concepts of cryptography. It delineates cryptographic concepts in chronological order, developing the mathematics as needed. The text includes numerous examples and exercises, along with computer implementation sections that guide readers through the process of writing their
This textbook presents a strong and clear relationship between theory and practice. It covers basic topics such as Dantzig's simplex algorithm, duality, sensitivity analysis, integer optimization models, and network models as well as more advanced topics including interior point algorithms, the branch-and-bound algorithm, cutting planes,
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.