0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (7)
  • R250 - R500 (62)
  • R500+ (5,387)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > General theory of computing > Data structures

Basic Prediction Techniques in Modern Video Coding Standards (Paperback, 1st ed. 2016): Byung-gyu Kim, Kalyan Goswami Basic Prediction Techniques in Modern Video Coding Standards (Paperback, 1st ed. 2016)
Byung-gyu Kim, Kalyan Goswami
R1,733 Discovery Miles 17 330 Ships in 10 - 15 working days

This book discusses in detail the basic algorithms of video compression that are widely used in modern video codec. The authors dissect complicated specifications and present material in a way that gets readers quickly up to speed by describing video compression algorithms succinctly, without going to the mathematical details and technical specifications. For accelerated learning, hybrid codec structure, inter- and intra- prediction techniques in MPEG-4, H.264/AVC, and HEVC are discussed together. In addition, the latest research in the fast encoder design for the HEVC and H.264/AVC is also included.

Mathematical Foundations of Computer Science 2015 - 40th International Symposium, MFCS 2015, Milan, Italy, August 24-28, 2015,... Mathematical Foundations of Computer Science 2015 - 40th International Symposium, MFCS 2015, Milan, Italy, August 24-28, 2015, Proceedings, Part I (Paperback, 1st ed. 2015)
Giuseppe F. Italiano, Giovanni Pighizzini, Donald T Sannella
R2,870 Discovery Miles 28 700 Ships in 10 - 15 working days

This two volume set LNCS 9234 and 9235 constitutes the refereed conference proceedings of the 40th International Symposium on Mathematical Foundations of Computer Science, MFCS 2015, held in Milan, Italy, in August 2015. The 82 revised full papers presented together with 5 invited talks were carefully selected from 201 submissions. The papers feature high-quality research in all branches of theoretical computer science. They have been organized in the following topical main sections: logic, semantics, automata, and theory of programming (volume 1) and algorithms, complexity, and games (volume 2).

Harmony Search Algorithm - Proceedings of the 2nd International Conference on Harmony Search Algorithm (ICHSA2015) (Paperback,... Harmony Search Algorithm - Proceedings of the 2nd International Conference on Harmony Search Algorithm (ICHSA2015) (Paperback, 1st ed. 2016)
Joong Hoon Kim, Zong Woo Geem
R6,915 Discovery Miles 69 150 Ships in 10 - 15 working days

The Harmony Search Algorithm (HSA) is one of the most well-known techniques in the field of soft computing, an important paradigm in the science and engineering community. This volume, the proceedings of the 2nd International Conference on Harmony Search Algorithm 2015 (ICHSA 2015), brings together contributions describing the latest developments in the field of soft computing with a special focus on HSA techniques. It includes coverage of new methods that have potentially immense application in various fields. Contributed articles cover aspects of the following topics related to the Harmony Search Algorithm: analytical studies; improved, hybrid and multi-objective variants; parameter tuning; and large-scale applications. The book also contains papers discussing recent advances on the following topics: genetic algorithms; evolutionary strategies; the firefly algorithm and cuckoo search; particle swarm optimization and ant colony optimization; simulated annealing; and local search techniques. This book offers a valuable snapshot of the current status of the Harmony Search Algorithm and related techniques, and will be a useful reference for practising researchers and advanced students in computer science and engineering.

Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers... Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers (Paperback, 1st ed. 2015)
Gregor Leander
R3,226 Discovery Miles 32 260 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 22nd International Workshop on Fast Software Encryption, held in Istanbul, Turkey, March 8-11, 2015. The 28 revised full papers presented were carefully reviewed and selected from 71 initial submissions. The papers are organized in topical sections on block cipher cryptanalysis; understanding attacks; implementation issues; more block cipher cryptanalysis; cryptanalysis of authenticated encryption schemes; proofs; design; lightweight; cryptanalysis of hash functions and stream ciphers; and mass surveillance.

Logics in Computer Science - A Study on Extensions of Temporal and Strategic Logics (Paperback, Softcover reprint of the... Logics in Computer Science - A Study on Extensions of Temporal and Strategic Logics (Paperback, Softcover reprint of the original 1st ed. 2013)
Fabio Mogavero
R1,952 Discovery Miles 19 520 Ships in 10 - 15 working days

In this monograph we introduce and examine four new temporal logic formalisms that can be used as specification languages for the automated verification of the reliability of hardware and software designs with respect to a desired behavior. The work is organized in two parts. In the first part two logics for computations, the graded computation tree logic and the computation tree logic with minimal model quantifiers are discussed. These have proved to be useful in describing correct executions of monolithic closed systems. The second part focuses on logics for strategies, strategy logic and memoryful alternating-time temporal logic, which have been successfully applied to formalize several properties of interactive plays in multi-entities systems modeled as multi-agent games.

Mathematical Modeling of Technological Processes - 8th International Conference, CITech 2015, Almaty, Kazakhstan, September... Mathematical Modeling of Technological Processes - 8th International Conference, CITech 2015, Almaty, Kazakhstan, September 24-27, 2015, Proceedings (Paperback, 1st ed. 2015)
Nargozy Danaev, Yurii Shokin, Akhmed-Zaki Darkhan
R1,501 Discovery Miles 15 010 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Mathematical modeling of technological processes track of the 8th International Conference on Computational and Information Technologies in Science, Engineering and Education, CITech 2015, held in Almaty, Kazakhstan, in September 2015. The 20 papers and one short paper presented were carefully reviewed and selected from 56 submissions to the track. They provide a forum for sharing new aspects of the progresses in the areas of mathematical modeling of technological processes; process automation and control; high performance computing; simulation.

Homomorphic Signature Schemes - A Survey (Paperback, 1st ed. 2016): Giulia Traverso, Denise Demirel, Johannes Buchmann Homomorphic Signature Schemes - A Survey (Paperback, 1st ed. 2016)
Giulia Traverso, Denise Demirel, Johannes Buchmann
R1,688 Discovery Miles 16 880 Ships in 10 - 15 working days

Homomorphic signature schemes are an important primitive for many applications and since their introduction numerous solutions have been presented. Thus, in this work we provide the first exhaustive, complete, and up-to-date survey about the state of the art of homomorphic signature schemes. First, the general framework where homomorphic signatures are defined is described and it is shown how the currently available types of homomorphic signatures can then be derived from such a framework. In addition, this work also presents a description of each of the schemes presented so far together with the properties it provides. Furthermore, three use cases, electronic voting, smart grids, and electronic health records, where homomorphic signature schemes can be employed are described. For each of these applications the requirements that a homomorphic signature scheme should fulfill are defined and the suitable schemes already available are listed. This also highlights the shortcomings of current solutions. Thus, this work concludes with several ideas for future research in the direction of homomorphic signature schemes.

Multi Tenancy for Cloud-Based In-Memory Column Databases - Workload Management and Data Placement (Paperback, Softcover reprint... Multi Tenancy for Cloud-Based In-Memory Column Databases - Workload Management and Data Placement (Paperback, Softcover reprint of the original 1st ed. 2014)
Jan Schaffner
R1,883 Discovery Miles 18 830 Ships in 10 - 15 working days

With the proliferation of Software-as-a-Service (SaaS) offerings, it is becoming increasingly important for individual SaaS providers to operate their services at a low cost. This book investigates SaaS from the perspective of the provider and shows how operational costs can be reduced by using "multi tenancy," a technique for consolidating a large number of customers onto a small number of servers. Specifically, the book addresses multi tenancy on the database level, focusing on in-memory column databases, which are the backbone of many important new enterprise applications. For efficiently implementing multi tenancy in a farm of databases, two fundamental challenges must be addressed, (i) workload modeling and (ii) data placement. The first involves estimating the (shared) resource consumption for multi tenancy on a single in-memory database server. The second consists in assigning tenants to servers in a way that minimizes the number of required servers (and thus costs) based on the assumed workload model. This step also entails replicating tenants for performance and high availability. This book presents novel solutions to both problems.

Computational Complexity of Solving Equation Systems (Paperback, 1st ed. 2015): Przemyslaw Broniek Computational Complexity of Solving Equation Systems (Paperback, 1st ed. 2015)
Przemyslaw Broniek
R1,688 Discovery Miles 16 880 Ships in 10 - 15 working days

This volume considers the computational complexity of determining whether a system of equations over a fixed algebra A has a solution. It examines in detail the two problems this leads to: SysTermSat(A) and SysPolSat(A), in which equations are built out of terms or polynomials, respectively. The book characterizes those algebras for which SysPolSat can be solved in a polynomial time. So far, studies and their outcomes have not covered algebras that generate a variety admitting type 1 in the sense of Tame Congruence Theory. Since unary algebras admit only type 1, this book focuses on these algebras to tackle the main problem. It discusses several aspects of unary algebras and proves that the Constraint Satisfaction Problem for relational structures is polynomially equivalent to SysTermSat over unary algebras. The book's final chapters discuss partial characterizations, present conclusions, and describe the problems that are still open.

Sublinear Algorithms for Big Data Applications (Paperback, 1st ed. 2015): Dan Wang, Zhu Han Sublinear Algorithms for Big Data Applications (Paperback, 1st ed. 2015)
Dan Wang, Zhu Han
R1,465 Discovery Miles 14 650 Ships in 10 - 15 working days

The brief focuses on applying sublinear algorithms to manage critical big data challenges. The text offers an essential introduction to sublinear algorithms, explaining why they are vital to large scale data systems. It also demonstrates how to apply sublinear algorithms to three familiar big data applications: wireless sensor networks, big data processing in Map Reduce and smart grids. These applications present common experiences, bridging the theoretical advances of sublinear algorithms and the application domain. Sublinear Algorithms for Big Data Applications is suitable for researchers, engineers and graduate students in the computer science, communications and signal processing communities.

Computational Topology in Image Context - 6th International Workshop, CTIC 2016, Marseille, France, June 15-17, 2016,... Computational Topology in Image Context - 6th International Workshop, CTIC 2016, Marseille, France, June 15-17, 2016, Proceedings (Paperback, 1st ed. 2016)
Alexandra Bac, Jean-Luc Mari
R2,377 Discovery Miles 23 770 Ships in 10 - 15 working days

This book constitutes the proceedings of the 6th International Workshop on Computational Topology in Image Context, CTIC 2016, held in Marseille, France, in June 2016. The 24 papers presented in this volume were carefully reviewed and selected from 35 submissions. Additionally, this volume contains 2 invited papers. CTIC covers a wide range of topics such as: topological invariants and their computation, homology, cohomology, linking number, fundamental groups; algorithm optimization in discrete geometry, transfer of mathematical tools, parallel computation in multi-dimensional volume context, hierarchical approaches; experimental evaluation of algorithms and heuristics; combinatorial or multi-resolution models; discrete or computational topology; geometric modeling guided by topological constraints; computational topological dynamics; and use of topological information in discrete geometry applications.

Real-time Security Extensions for EPCglobal Networks - Case Study for the Pharmaceutical Industry (Paperback, Softcover reprint... Real-time Security Extensions for EPCglobal Networks - Case Study for the Pharmaceutical Industry (Paperback, Softcover reprint of the original 1st ed. 2014)
Matthieu-P. Schapranow
R1,952 Discovery Miles 19 520 Ships in 10 - 15 working days

The transformation towards EPCglobal networks requires technical equipment for capturing event data and IT systems to store and exchange them with supply chain participants. For the very first time, supply chain participants thus need to face the automatic exchange of event data with business partners. Data protection of sensitive business secrets is therefore the major aspect that needs to be clarified before companies will start to adopt EPCglobal networks. This book contributes to this proposition as follows: it defines the design of transparent real-time security extensions for EPCglobal networks based on in-memory technology. For that, it defines authentication protocols for devices with low computational resources, such as passive RFID tags, and evaluates their applicability. Furthermore, it outlines all steps for implementing history-based access control for EPCglobal software components, which enables a continuous control of access based on the real-time analysis of the complete query history and a fine-grained filtering of event data. The applicability of these innovative data protection mechanisms is underlined by their exemplary integration in the FOSSTRAK architecture.

Guide to Programming and Algorithms Using R (Paperback, Softcover reprint of the original 1st ed. 2013): OEzgur Ergul Guide to Programming and Algorithms Using R (Paperback, Softcover reprint of the original 1st ed. 2013)
OEzgur Ergul
R2,032 Discovery Miles 20 320 Ships in 10 - 15 working days

This easy-to-follow textbook provides a student-friendly introduction to programming and algorithms. Emphasis is placed on the threshold concepts that present barriers to learning, including the questions that students are often too embarrassed to ask. The book promotes an active learning style in which a deeper understanding is gained from evaluating, questioning, and discussing the material, and practised in hands-on exercises. Although R is used as the language of choice for all programs, strict assumptions are avoided in the explanations in order for these to remain applicable to other programming languages. Features: provides exercises at the end of each chapter; includes three mini projects in the final chapter; presents a list of titles for further reading at the end of the book; discusses the key aspects of loops, recursions, program and algorithm efficiency and accuracy, sorting, linear systems of equations, and file processing; requires no prior background knowledge in this area.

Embedded System Technology - 13th National Conference, ESTC 2015, Beijing, China, October 10-11, 2015, Revised Selected Papers... Embedded System Technology - 13th National Conference, ESTC 2015, Beijing, China, October 10-11, 2015, Revised Selected Papers (Paperback, 1st ed. 2015)
Xing Zhang, Zhonghai Wu, Xingmian Sha
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 13th National Conference on Embedded System Technology, ESTC 2015, held in Beijing, China, in October 2015. The 18 revised full papers presented were carefully reviewed and selected from 63 papers. The topics cover a broad range of fields focusing on research about embedded system technologies, such as smart hardware, system and network, applications and algorithm.

Distributed Graph Algorithms for Computer Networks (Paperback, 2013 ed.): Kayhan Erciyes Distributed Graph Algorithms for Computer Networks (Paperback, 2013 ed.)
Kayhan Erciyes
R2,703 Discovery Miles 27 030 Ships in 10 - 15 working days

This book presents a comprehensive review of key distributed graph algorithms for computer network applications, with a particular emphasis on practical implementation. Topics and features: introduces a range of fundamental graph algorithms, covering spanning trees, graph traversal algorithms, routing algorithms, and self-stabilization; reviews graph-theoretical distributed approximation algorithms with applications in ad hoc wireless networks; describes in detail the implementation of each algorithm, with extensive use of supporting examples, and discusses their concrete network applications; examines key graph-theoretical algorithm concepts, such as dominating sets, and parameters for mobility and energy levels of nodes in wireless ad hoc networks, and provides a contemporary survey of each topic; presents a simple simulator, developed to run distributed algorithms; provides practical exercises at the end of each chapter.

LATIN 2016: Theoretical Informatics - 12th Latin American Symposium, Ensenada, Mexico, April 11-15, 2016, Proceedings... LATIN 2016: Theoretical Informatics - 12th Latin American Symposium, Ensenada, Mexico, April 11-15, 2016, Proceedings (Paperback, 1st ed. 2016)
Evangelos Kranakis, Gonzalo Navarro, Edgar Chavez
R1,652 Discovery Miles 16 520 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12th Latin American Symposium on Theoretical Informatics, LATIN 2016, held in Ensenada, Mexico, in April 2016. The 52 papers presented together with 5 abstracts were carefully reviewed and selected from 131 submissions. The papers address a variety of topics in theoretical computer science with a certain focus on algorithms (approximation, online, randomized, algorithmic game theory, etc.), analytic combinatorics and analysis of algorithms, automata theory and formal languages, coding theory and data compression, combinatorial algorithms, combinatorial optimization, combinatorics and graph theory, complexity theory, computational algebra, computational biology, computational geometry, computational number theory, cryptology, databases and information retrieval, data structures, formal methods and security, Internet and the web, parallel and distributed computing, pattern matching, programming language theory, and random structures.

Transactions on Large-Scale Data- and Knowledge-Centered Systems XXVI - Special Issue on Data Warehousing and Knowledge... Transactions on Large-Scale Data- and Knowledge-Centered Systems XXVI - Special Issue on Data Warehousing and Knowledge Discovery (Paperback, 1st ed. 2016)
Abdelkader Hameurlain, Josef Kung, Roland Wagner, Ladjel Bellatreche, Mukesh Mohania
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

The LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge processing, which are core and hot topics in computer science. Since the 1990s, the Internet has become the main driving force behind application development in all domains. An increase in the demand for resource sharing across different sites connected through networks has led to an evolution of data- and knowledge-management systems from centralized systems to decentralized systems enabling large-scale distributed applications providing high scalability. Current decentralized systems still focus on data and knowledge as their main resource. Feasibility of these systems relies basically on P2P (peer-to-peer) techniques and the support of agent systems with scaling and decentralized control. Synergy between grids, P2P systems, and agent technologies is the key to data- and knowledge-centered systems in large-scale environments.This volume, the 26th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, focuses on Data Warehousing and Knowledge Discovery from Big Data, and contains extended and revised versions of four papers selected as the best papers from the 16th International Conference on Data Warehousing and Knowledge Discovery (DaWaK 2014), held in Munich, Germany, during September 1-5, 2014. The papers focus on data cube computation, the construction and analysis of a data warehouse in the context of cancer epidemiology, pattern mining algorithms, and frequent item-set border approximation.

Transactions on Large-Scale Data- and Knowledge-Centered Systems XXV (Paperback, 1st ed. 2016): Abdelkader Hameurlain, Josef... Transactions on Large-Scale Data- and Knowledge-Centered Systems XXV (Paperback, 1st ed. 2016)
Abdelkader Hameurlain, Josef Kung, Roland Wagner
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This, the 25th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains five fully revised selected papers focusing on data and knowledge management systems. Topics covered include a framework consisting of two heuristics with slightly different characteristics to compute the action rating of data stores, a theoretical and experimental study of filter-based equijoins in a MapReduce environment, a constraint programming approach based on constraint reasoning to study the view selection and data placement problem given a limited amount of resources, a formalization and an approximate algorithm to tackle the problem of source selection and query decomposition in federations of SPARQL endpoints, and a matcher factory enabling the generation of a dedicated schema matcher for a given schema matching scenario.

Analytical and Stochastic Modelling Techniques and Applications - 22nd International Conference, ASMTA 2015, Albena, Bulgaria,... Analytical and Stochastic Modelling Techniques and Applications - 22nd International Conference, ASMTA 2015, Albena, Bulgaria, May 26-29, 2015. Proceedings (Paperback, 2015 ed.)
Marco Gribaudo, Daniele Manini, Anne Remke
R2,124 Discovery Miles 21 240 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 22nd International Conference on Analytical and Stochastic Modelling Techniques and Applications, ASMTA 2015, held in Albena, Bulgaria, in May 2015. The 15 full papers presented in this book were carefully reviewed and selected from numerous submissions. The papers discuss the latest developments in analytical, numerical and simulation algorithms for stochastic systems, including Markov processes, queueing networks, stochastic Petri nets, process algebras, game theory, etc.

Web and Internet Economics - 11th International Conference, WINE 2015, Amsterdam, The Netherlands, December 9-12, 2015,... Web and Internet Economics - 11th International Conference, WINE 2015, Amsterdam, The Netherlands, December 9-12, 2015, Proceedings (Paperback, 1st ed. 2015)
Evangelos Markakis, Guido Schafer
R2,802 Discovery Miles 28 020 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed proceedings of the 11th International Conference on Web and Internet Economics, WINE 2015, held in Amsterdam, The Netherlands, in December 2015. The 30 regular papers presented together with 8 abstracts were carefully reviewed and selected from 142 submissions and cover results on incentives and computation in theoretical computer science, artificial intelligence, and microeconomics.

Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIV - Special Issue on Database- and Expert-Systems... Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIV - Special Issue on Database- and Expert-Systems Applications (Paperback, 1st ed. 2016)
Abdelkader Hameurlain, Josef Kung, Roland Wagner, Hendrik Decker, Lenka Lhotska, …
R2,147 Discovery Miles 21 470 Ships in 10 - 15 working days

This, the 24th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains extended and revised versions of seven papers presented at the 25th International Conference on Database and Expert Systems Applications, DEXA 2014, held in Munich, Germany, in September 2014. Following the conference, and two further rounds of reviewing and selection, six extended papers and one invited keynote paper were chosen for inclusion in this special issue. Topics covered include systems modeling, similarity search, bioinformatics, data pricing, k-nearest neighbor querying, database replication, and data anonymization.

Advanced DPA Theory and Practice - Towards the Security Limits of Secure Embedded Circuits (Paperback, 2013 ed.): Eric Peeters Advanced DPA Theory and Practice - Towards the Security Limits of Secure Embedded Circuits (Paperback, 2013 ed.)
Eric Peeters
R3,269 Discovery Miles 32 690 Ships in 10 - 15 working days

Advanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The book presents a thorough analysis about leakage origin of embedded system. This book examines the systematic approach of the different aspects and advanced details about experimental setup for electromagnetic attack. The author discusses advanced statistical methods to successfully attack embedded devices such as high-order attack, template attack in principal subspaces, machine learning methods. The book includes theoretical framework to define side-channel based on two metrics: mutual information and success rate.

Machine Learning - Algorithms and Applications (Hardcover): Mohssen Mohammed, Muhammad Badruddin Khan, Eihab Bashier Mohammed... Machine Learning - Algorithms and Applications (Hardcover)
Mohssen Mohammed, Muhammad Badruddin Khan, Eihab Bashier Mohammed Bashier
R2,611 Discovery Miles 26 110 Ships in 12 - 19 working days

Machine learning, one of the top emerging sciences, has an extremely broad range of applications. However, many books on the subject provide only a theoretical approach, making it difficult for a newcomer to grasp the subject material. This book provides a more practical approach by explaining the concepts of machine learning algorithms and describing the areas of application for each algorithm, using simple practical examples to demonstrate each algorithm and showing how different issues related to these algorithms are applied.

Evolutionary and Biologically Inspired Music, Sound, Art and Design - 4th International Conference, EvoMUSART 2015, Copenhagen,... Evolutionary and Biologically Inspired Music, Sound, Art and Design - 4th International Conference, EvoMUSART 2015, Copenhagen, Denmark, April 8-10, 2015, Proceedings (Paperback, 2015 ed.)
Colin Johnson, Adrian Carballal, Joao Correia
R2,296 Discovery Miles 22 960 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 4th International Conference on Biologically Inspired Music, Sound, Art and Design, EvoMUSART 2015, held in Copenhagen, Denmark, in April 2015, co-located with the Evo* 2015 events EuroGP, EvoCOP and Evo Applications. The 23 revised full papers presented were carefully reviewed and selected from 43 submissions. They cover a wide range of topics and application areas, including generative approaches to music, graphics, game content and narrative; music information retrieval; computational aesthetics; the mechanics of interactive evolutionary computation and the art theory of evolutionary computation.

Computer Engineering and Technology - 18th CCF Conference, NCCET 2014, Guiyang, China, July 29 -- August 1, 2014. Revised... Computer Engineering and Technology - 18th CCF Conference, NCCET 2014, Guiyang, China, July 29 -- August 1, 2014. Revised Selected Papers (Paperback, 2015 ed.)
Weixia Xu, Liquan Xiao, Jinwen Li, Chengyi Zhang, Zhenzhen Zhu
R1,494 Discovery Miles 14 940 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 18th National Conference on Computer Engineering and Technology, NCCET 2014, held in Guiyang, China, during July/August 2014. The 18 papers presented were carefully reviewed and selected from 85 submissions. They are organized in topical sections on processor architecture; computer application and software optimization; technology on the horizon.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Robotic Vehicles: Systems and Technology
Tian Seng Ng Hardcover R4,113 Discovery Miles 41 130
MATLAB Applications in Engineering
Constantin Volosencu Hardcover R3,310 Discovery Miles 33 100
C Programming - C Programming Language…
Adam Dodson Hardcover R598 R542 Discovery Miles 5 420
Image Analysis, Classification and…
Morton John Canty Paperback R1,540 Discovery Miles 15 400
A Textbook of Data Structures and…
Vijayalakshmi P Hardcover R3,817 Discovery Miles 38 170
Network Flows - Pearson New…
Ravindra Ahuja, Thomas Magnanti, … Paperback R2,679 Discovery Miles 26 790
Python Programming for Computations…
Computer Language Hardcover R1,216 R1,024 Discovery Miles 10 240
Handbook of Research on Fireworks…
Ying Tan Hardcover R8,709 Discovery Miles 87 090
Genetic Algorithms with Python
Clinton Sheppard Hardcover R911 R858 Discovery Miles 8 580
Gamma Solution - An Application of…
James R Warren Hardcover R1,338 R1,131 Discovery Miles 11 310

 

Partners