You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
A thorough development of a topic at the core of mathematics, ideal for graduate students and professional mathematicians.
None
The first English translation of essays from one of the twentieth century's most intriguing avant-garde writers Compiled from two volumes of Raymond Queneau's essays (Bâtons, chiffres et lettres and Le Voyage en Grèce), these selections find Queneau at his most playful and at his most serious, eloquently pleading for a certain classicism even as he reveals the roots of his own wildly original oeuvre. Ranging from the funny to the furious, they follow Queneau from modernism to postmodernism by way of countless fascinating detours, including his thoughts on language, literary fashions, myth, politics, poetry, and other writers (Faulkner, Flaubert, Hugo, and Proust). Translator Jordan Stump provides an introduction as well as explanatory notes about key figures and Queneau himself.
This book is a primary survey of basic thermodynamic concepts that will allow one to predict states of a fuel cell system, including potential, temperature, pressure, volume and moles. The specific topics explored include enthalpy, entropy, specific heat, Gibbs free energy, net output voltage irreversible losses in fuel cells and fuel cell efficiency. It contains twelve chapters organized into two sections on “Theoretical Models” and “Applications.” The specific topics explored include enthalpy, entropy, specific heat, Gibbs free energy, net output voltage irreversible losses in fuel cells and fuel cell efficiency.
A growing proportion of applications and protocols used over the Internet either have significant security-related features or have as their primary purpose the provision of some security facility. Many of these applications and protocols use cryptographic algorithms to implement security services. This book provides you with a comprehensive introduction to the use of cryptographic algorithms in data network security, with a special emphasis on practical internetworking applications. The book focuses on the underlying principles and main approaches to cryptography, and covers both conventional and public-key encryption and the most important algorithms, including DES, triple DES, RSA, and IDEA. Furthermore, the text discusses issues concerning authentication and digital signatures and explains the use of public-key encryption and secure hash functions in this context. It concludes with an examination into the practical uses of cryptographic algorithms in some key inter-networking applications.
This book was prepared as the Final Publication of COST Action IC0703 "Data Traffic Monitoring and Analysis: theory, techniques, tools and applications for the future networks". It contains 14 chapters which demonstrate the results, quality,and the impact of European research in the field of TMA in line with the scientific objective of the Action. The book is structured into three parts: network and topology measurement and modelling, traffic classification and anomaly detection, quality of experience.
During the last few years, software evolution research has explored new domains such as the study of socio-technical aspects and collaboration between different individuals contributing to a software system, the use of search-based techniques and meta-heuristics, the mining of unstructured software repositories, the evolution of software requirements, and the dynamic adaptation of software systems at runtime. Also more and more attention is being paid to the evolution of collections of inter-related and inter-dependent software projects, be it in the form of web systems, software product families, software ecosystems or systems of systems. With this book, the editors present insightful contr...