Search alternatives:
22computational methods » computational methods, computational method, computation methods

21
Published 2014
John Wiley and Sons, Inc.
Table of Contents: ... Introduction; 2.2 Platinum Nanoparticles; 2.3 Gold Nanoparticles; 2.4 Silver Nanoparticles; 2.5 Assembly...

22
by Lee, Martin
Published 2023
John Wiley & Sons, Inc.
Table of Contents: ... Geospatial Analytical Method -- 5.5.2 Analysis of Competing Hypotheses -- 5.5.3 Poor Practices -- 5.6 Sharing...

23
by Chollet, François
Published 2018
Manning Publications
Table of Contents: .... Kernel methods -- 1.2.4. Decision trees, random forests, and gradient boosting machines -- 1.2.5. Back...

24
by Haghighi, Aliakbar Montazer, Mishev, D. P.
Published 2016
John Wiley & Sons
Table of Contents: ...4.10.3 Transient Solution of the M/M/1 by Lattice Path Method4.11 Stationary M/M/C Queueing Process...

25
by Sokolowski, John A.
Published 2012
John Wiley & Sons
Table of Contents: ...--The Impact of Element Quality and Size on Simulation; 7.4 Modeling Paradigms--Methods for Mesh Generation...

26
by Tudose, Catalin
Published 2023
Manning Publications Co. LLC
Table of Contents: ...3.3.1 Annotation-based metadata -- 3.3.2 Applying constraints to Java objects -- 3.3.3...

27
by Patrick, Tim
Published 2010
O'Reilly Media
Table of Contents: ... Aggregates -- Applying Set Operations -- Summary -- Chapter 17. Quick Reference -- 18. Using LINQ to DataSet...

28
by Schmidt, Douglas C.
Published 2014
Addison-Wesley Professional
Subjects: ...Object-oriented programming (Computer science) / http://id.loc.gov/authorities/subjects/sh87007503...

29 Table of Contents: ...: Big Data Cryptography -- Chapter 17: Cloud Computing Cryptography -- Part III: Pro Cryptanalysis...

30
by Markandeya, Sushil
Published 2017
Apress
Table of Contents: ... MethodsIntroduction, Data Migration ScenariosReading Input Files from Presentation ServerReading Input Files from...

31
by Ruan, Keyun
Published 2019
Academic Press
Table of Contents: ... Challenges; 4.4 Cost Models for Incidents and Losses; 4.5 Methods for Cyber Risk Measurement; 4.6 Introducing...

32
by Babau, Jean-Philippe
Published 2010
Iste
Table of Contents: .... Acknowledgements; 1.7. Bibliography; Chapter 2. Model-Based Code Generation; 2.1. Introduction; 2.2. The model...

33
by Freeman, Adam
Published 2013
Apress
Table of Contents: ... 22. Using the dialog and spinner widgets -- chapter 23. Using the menu and tooltip widgets -- chapter...

34
by Chihara, Laura
Published 2011
J. Wiley & Sons
Table of Contents: ... Exercises; Chapter 10: Bayesian Methods; 10.1 Bayes'Theorem...

35
by Zhuge, Hai
Published 2016
Elsevier
Table of Contents: ...1.7.2 Big data1.8 Shifting paradigm; 2 The emerging structures; 2.1 Near decomposability; 2.2 Text...

36
by Bahadori, Alireza
Published 2014
Elsevier
Table of Contents: ...3.2. Methods of Applying Cathodic Protection -- 3.2.1. Impressed Current -- 3.2.2. Sacrificial...

37
by Crawley, Frank, Tyler, Brian
Published 2015
Elsevier
Table of Contents: ... Essential Features of HAZOP Study; 2 Process Hazard Studies; 2.1 HS 1-Concept Stage Hazard Review; 2.2 HS 2...

38
Published 1983
Springer US
Table of Contents: ... in central and western Europe -- 14. On a method of evaluation of performance of a trajectory model for long...