81-100
of
655
results
-
Pre-Owned The Algorithm Design...It s a preowned item in good condition and includes all the pages. It may have... It s a preowned item in good condition and includes all the pages. It may have some general signs of wear and tear such as markings highlighting slight damage to the cover minimal wear to the binding etc. but they will not affect the overall reading... more
-
Springerbriefs in Computer Sci...In real-world applications new data patterns and categories that were not cove... In real-world applications new data patterns and categories that were not covered by the training data can frequently emerge necessitating the capability to detect and adapt to novel characters incrementally. Researchers refer to these challenges as... more
-
Texts in Theoretical Computer ...The book is a foundation of the most important formalisms used for specificati... The book is a foundation of the most important formalisms used for specification and verification of reactive systems. In particular it presents all important results on m-calculus w-automata and temporal logics shows the relationships between these... more
-
Texts in Computational Science...Particle models play an important role in many applications in physics chemist... Particle models play an important role in many applications in physics chemistry and biology. These can be studied on the computer with the help of molecular dynamics simulations. This book presents in detail the necessary numerical methods the... more
-
Texts in Theoretical Computer ...Essential topic in modern life science research Self-contained presentation Au... Essential topic in modern life science research Self-contained presentation Authors are leading researchers in the domain more
-
Pre-Owned Devsecops for .Net C...Automate core security tasks by embedding security controls and processes earl... Automate core security tasks by embedding security controls and processes early in the DevOps workflow through DevSecOps. You will not only learn the various stages in the DevOps pipeline through examples of solutions developed and deployed using... more
-
Algorithms Java: Explains Algo...This book is rich in examples with beautiful pictures and texts and explains t... This book is rich in examples with beautiful pictures and texts and explains the data structure and algorithms in a way that is easy to understand. It is designed to help programmers better use the energy of algorithms in daily projects. 1. Classic... more
-
Devsecops for .Net Core: Secur...Automate core security tasks by embedding security controls and processes earl... Automate core security tasks by embedding security controls and processes early in the DevOps workflow through DevSecOps. You will not only learn the various stages in the DevOps pipeline through examples of solutions developed and deployed using... more
-
Algorithms C++ : Explains Algo...This book is rich in examples with beautiful pictures and texts and explains t... This book is rich in examples with beautiful pictures and texts and explains the data structure and algorithms in a way that is easy to understand. It is designed to help programmers better use the energy of algorithms. 1. Classic reference book in... more
-
Algorithms C#: Explains Algori...This book is rich in examples with beautiful pictures and texts and explains t... This book is rich in examples with beautiful pictures and texts and explains the data structure and algorithms in a way that is easy to understand. It is designed to help programmers better use the energy of algorithms in daily projects.1. Classic... more
-
Algorithms Go : Explains Algor...This book is rich in examples with beautiful pictures and texts and explains t... This book is rich in examples with beautiful pictures and texts and explains the data structure and algorithms in a way that is easy to understand. It is designed to help programmers better use the energy of algorithms. 1. Classic reference book in... more
-
Algorithms JavaScript: Explain...This book is rich in examples with beautiful pictures and texts and explains t... This book is rich in examples with beautiful pictures and texts and explains the data structure and algorithms in a way that is easy to understand. It is designed to help programmers better use the energy of algorithms in daily projects.1. Classic... more
-
DevSecOps for Azure: End-to-en...Gain holistic insights and practical expertise in embedding security within th... Gain holistic insights and practical expertise in embedding security within the DevOps pipeline specifically tailored for Azure cloud environments Key Features: - Learn how to integrate security into Azure DevOps workflows for cloud infrastructure -... more
-
The Innovator s Toolkit DevSec...DevSecOps for Continuous Innovation is a comprehensive guide aimed at integrat... DevSecOps for Continuous Innovation is a comprehensive guide aimed at integrating security into the development and operational processes of software delivery known as DevSecOps. The text emphasizes the importance of incorporating security as a... more
-
Multi-Class Classification for...Over 725 steganography tools are available over the Internet each providing a ... Over 725 steganography tools are available over the Internet each providing a method for covert transmission of secret messages. This research presents four steganalysis advancements that result in an algorithm that identifies the steganalysis tool... more
-
Multi-Class Classification for...Over 725 steganography tools are available over the Internet each providing a ... Over 725 steganography tools are available over the Internet each providing a method for covert transmission of secret messages. This research presents four steganalysis advancements that result in an algorithm that identifies the steganalysis tool... more
-
Pre-Owned Extending and Embedd...The item might be beaten up but readable. May contain markings or highlighting... The item might be beaten up but readable. May contain markings or highlighting as well as stains bent corners or any other major defect but the text is not obscured in any way. more
-
An Introduction to String Algo...An essential introduction to the building blocks of modern text processing Str... An essential introduction to the building blocks of modern text processing String algorithms make it possible to process store and manipulate text with computational efficiency with applications ranging from search engines and social networks that... more
-
Evolutionary Optimization Algo...The text covers evolutionary optimizing algorithms with the help of MATLAB and... The text covers evolutionary optimizing algorithms with the help of MATLAB and Python programming in a comprehensive manner. It will be an ideal reference text for readers in diverse engineering fields including electrical electronics and... more
-
Handbook of Exact String Match...String matching is a very important subject in the wider domain of text proces... String matching is a very important subject in the wider domain of text processing. It consists of finding one or more generally all the occurrences of a string (more generally called a pattern) in a text. The Handbook of Exact String Matching... more
Ads related to text embedding grovers algorithm devsecops