Cool PC Parts
NOTE: Before purchasing, check with your instructor to ensure you select the correct ISBN. Several versions of Pearson's MyLab & Mastering products exist for each title, and registrations are not transferable. To register for and use Pearson's MyLab & Mastering products, you may also need a Course ID, which your instructor will provide.
Personalize Learning with MasteringEngineering
MasteringEngineering is an online homework, tutorial, and assessment system, designed to improve results through personalized learning. This innovative online program emulates the instructor's office hour environment, engaging and guiding students through engineering concepts with self-paced individualized coaching With a wide range of activities available, students can actively learn, understand, and retain even the most difficult concepts.
0134123832/9780134123837 Computer Systems: A Programmer's Perspective plus MasteringEngineering with Pearson eText - Access Card Package, 3/e
Package consists of:
013409266X/9780134092669 Computer Systems: A Programmer's Perspective, 3/e
0134071921/9780134071923 MasteringEngineering with Pearson eText -- Standalone Access Card -- for Computer Systems: A Programmer's Perspective, 3/e
Many books explain the theory of atomistic computer simulations; this book teaches you how to run them
This book includes checklists for planning projects, analyzing output files, and for troubleshooting, as well as pseudo keywords and case studies.
The authors provide an accompanying blog for the book with worked examples, and additional material and references: http://www.atomisticsimulations.org/.
This book presents practical optimization techniques used in image processing and computer vision problems. Ill-posed problems are introduced and used as examples to show how each type of problem is related to typical image processing and computer vision problems. Unconstrained optimization gives the best solution based on numerical minimization of a single, scalar-valued objective function or cost function. Unconstrained optimization problems have been intensively studied, and many algorithms and tools have been developed to solve them. Most practical optimization problems, however, arise with a set of constraints. Typical examples of constraints include: (i) pre-specified pixel intensity range, (ii) smoothness or correlation with neighboring information, (iii) existence on a certain contour of lines or curves, and (iv) given statistical or spectral characteristics of the solution. Regularized optimization is a special method used to solve a class of constrained optimization problems. The term regularization refers to the transformation of an objective function with constraints into a different objective function, automatically reflecting constraints in the unconstrained minimization process. Because of its simplicity and efficiency, regularized optimization has many application areas, such as image restoration, image reconstruction, optical flow estimation, etc.
Over the past two decades anthropologists have been challenged to rethink the nature of ethnographic research, the meaning of fieldwork, and the role of ethnographers. Ethnographic fieldwork has cultural, social, and political ramifications that have been much discussed and acted upon, but the training of ethnographers still follows a very traditional pattern; this volume engages and takes its point of departure in the experiences of ethnographers-in-the-making that encourage alternative models for professional training in fieldwork and its intellectual contexts.
The work done by contributors to Fieldwork Is Not What It Used to Be articulates, at the strategic point of career-making research, features of this transformation in progress. Setting aside traditional anxieties about ethnographic authority, the authors revisit fieldwork with fresh initiative. In search of better understandings of the contemporary research process itself, they assess the current terms of the engagement of fieldworkers with their subjects, address the constructive, open-ended forms by which the conclusions of fieldwork might take shape, and offer an accurate and useful description of what it means to become-and to be-an anthropologist today.
Contributors: Lisa Breglia, George Mason University; Jae A. Chung, Aalen University; James D. Faubion, Rice University; Michael M. J. Fischer, MIT; Kim Fortun, Rensselaer Polytechnic Institute; Jennifer A. Hamilton, Hampshire College; Christopher M. Kelty, UCLA; George E. Marcus, University of California, Irvine; Nahal Naficy, Rice University; Kristin Peterson, University of California, Irvine; Deepa S. Reddy, University of Houston-Clear Lake
E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of applications. The core areas of e-based security - authentication of users; system integrity; confidentiality of communication; availability of business service; and non-repudiation of transactions - are covered in detail. Throughout the book the major trends, challenges and applications of e-security are presented, with emphasis on public key infrastructure (PKI) systems, biometric-based security systems, trust management systems, and the e-service paradigm. Intrusion detection technologies, virtual private networks (VPNs), malware, and risk management are also discussed. Technically oriented with many practical examples, this book is suitable for practitioners in network security, as well as graduate students and researchers in telecommunications and computer science.
Cool PC Parts Articles
Cool PC Parts Books
Cool PC Parts