Search ResultsElectronic Resources
Limit Search Results
Author
Language
Subject
Library
272 Results Found Subscribe to search results
000000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Ashimov, Abdykappar A. author.
      Format: 
      Excerpt: 
      algorithms. The described methodology leads to the development of computer-based decision support systems.  
      by 
      Plattner, Hasso. author.
      Format: 
      Excerpt: 
      students of computer science, software engineering, and IT related subjects. However, it addresses business
      by 
      Haladyna, Thomas M., author
      Format: 
      Excerpt: 
      delivered in a computer-based environment. Key features include: Comprehensive and Flexible--No other book
      by 
      Haladyna, Thomas M.
      Format: 
      Excerpt: 
      delivered in a computer-based environment. Key features include: Comprehensive and Flexible--No other book
      by 
      Pal, Sankar K.
      Format: 
      Excerpt: 
      surveillance is an extremely interdisciplinary area, embracing the study of methods and algorithms for computer
      by 
      Biringen, Sedat.
      Format: 
      Excerpt: 
      sophistication of the algorithms used but also advances in the computer hardware and software available. The
      by 
      Byrne, Peter.
      Format: 
      Excerpt: 
      computer algorithms that revolutionized military operations research; and performed pioneering work in
      by 
      Soliman, S. A.
      Format: 
      Excerpt: 
      advantages and disadvantages and when they are best utilized. Supported by an online computer program, this
      by 
      Wayner, Peter, 1964-
      Format: 
      Excerpt: 
      algorithms and techniques (such as fingerprinting, synchronization, and quantization) capable of withstanding
      by 
      Aghajan, Hamid K.
      Format: 
      Excerpt: 
      engineers, computer engineers, and graduate students working in signal and video processing, computer vision
      by 
      Joshi, James B. D.
      Format: 
      Excerpt: 
      Gen Mobile Computing (2006) -- 70 pp -- Ch 7 Network Security Algorithms- reprint Ch 17 from Varghese
      by 
      Janssens, Koenraad G. F., 1968-
      Format: 
      Excerpt: 
      modeling systems. Finally, the book will offer the reader a variety of algorithms to use in solving typical