" "



:





.. 1 ... 6 7 8 9 10 11 12 13 14 ... 54


: Curves and Surfaces In Geometric Modeling: Theory And Algorithms
: Jean Gallier
: University of Pennsylvania
: 2013
: pdf
: 502
: 2,4 mb.
: English

This book is primarily an introduction to geometric concepts and tools needed for solving problems of a geometric nature with a computer. Our main goal is to provide an introduction to the mathematical concepts needed in tackling problems arising notably in computer graphics, geometric modeling, computer vision, and motion planning, just to mention some key areas. Many problems in the above areas require some geometric knowledge, but in our opinion, books dealing with the relevant geometric material are either too theoretical, or else rather specialized and application-oriented. This book is an attempt to fill this gap. We present a coherent view of geometric methods applicable to many engineering problems at a level that can be understood by a senior undergraduate with a good math background.
: Semka 15-01-2019, 11:13 | : 0 |

: Computer Systems
: Daniel J. Taipala
: University of the People
: 2013
: pdf
: 172
: 2,3 mb.
: English

This book has been developed as a companion text to the University of the People course CS1104 Computer Systems. The University of the People is an accredited online university that offers programs in business administration and computer science. The university is unique in that it has no tuition, is tuition free, non-profit, and serves students from around the world.
: Semka 15-01-2019, 11:11 | : 0 |

: Artificial and Computational Intelligence in Games: Integration
: Various
: Autoedici?n
: 2015
: pdf
: 36
: 1,2 mb.
: English

This report documents Dagstuhl Seminar 15051 Artificial and Computational Intelligence in Games: Integration. The focus of the seminar was on the computational techniques used to create, enhance, and improve the experiences of humans interacting with and within virtual environments. Different researchers in this field have different goals, including developing and testing new AI methods, creating interesting and believable non-player characters, improving the game production pipeline, studying game design through computational means, and understanding players and patterns of interaction.
: Semka 15-01-2019, 11:08 | : 0 |

: Towards Efficient Exploitation of GPUs
: Jacobo Lobeiras Blanco
: Universidade da Coru?a
: 2014
: pdf
: 222
: 9,6 mb.
: English

GPU computing supposed a major step forward, bringing high performance computing to commodity hardware. Feature-rich parallel languages like CUDA and OpenCL reduced the programming complexity. However, to fully take advantage of their computing power, specialized parallel algorithms are required. Moreover, the complex GPU memory hierarchy and highly threaded architecture makes programming a difficult task even for experienced programmers. Due to the novelty of GPU programming, common general purpose libraries are scarce and parallel versions of the algorithms are not always readily available.
: Semka 11-01-2019, 12:21 | : 0 |

: Think Complexity 2
: Allen B. Downey
: Green Tea Press
: 2016
: pdf
: 214
: 1,4 mb.
: English

This book is primarily about complexity science, but it is also about data structures and algorithms, intermediate programming in Python, computational modeling, and the philosophy of science.
: Semka 11-01-2019, 12:20 | : 0 |

: Handbook Statistical foundations of machine learning
: Gianluca Bontempi
: Universite Libre de Bruxelles
: 2013
: pdf
: 267
: 7,07 mb.
: English

In recent years, a growing number of organizations have been allocating vast amount of resources to construct and maintain databases and data warehouses. In scientific endeavours, data refers to carefully collected observations about some phenomenonunder study. In business, data capture information about economic trends, critical markets, competitors and customers. In manufacturing, data record machinery performances and production rates in different conditions. There are essentially two reasons why people gather increasing volumes of data: first, they think some valuable assets are implicitly coded within them, and computer technology enables effective data storage at reduced costs.
: Semka 11-01-2019, 12:20 | : 0 |

: Statistical Learning and Sequential Prediction
: Alexander Rakhlin , Karthik Sridharan
: Autoedici?n
: 2014
: pdf
: 261
: 2,4 mb.
: English

This course will focus on theoretical aspects of Statistical Learning and Sequential Prediction. Until recently, these two subjects have been treated separately within the learning community. The course will follow a unified approach to analyzing learning in both scenarios. To make this happen, we shall bring together ideas from probability and statistics, game theory, algorithms, and optimization. It is this blend of ideas that makes the subject interesting for us, and we hope to convey the excitement. We shall try to make the course as self-contained as possible, and pointers to additional readings will be provided whenever necessary. Our target audience is graduate students with a solid background in probability and linear algebra.
: Semka 11-01-2019, 12:20 | : 0 |

: Probabilistic Programming for Procedural Modeling and Design
: Daniel Ritchie
: Standford University
: 2016
: pdf
: 152
: 43 mb.
: English

Procedural modeling, or the use of pseudo-random programs to generate visual content, plays an important role in computer graphics and design. It facilitates content creation at massive scales, can automatically create painstakingly-detailed imagery, and can even generate pleasantly surprising results that can help people to navigate large and unintuitive design spaces
: Semka 11-01-2019, 12:20 | : 0 |
,
: Parallel Cryptanalysis
: Ruben Niederhagen
: Autoedici?n
: 2012
: pdf
: 125
: 0,8 mb.
: English

Most of todays cryptographic primitives are based on computations that are hard to perform for a potential attacker but easy to perform for somebody who is in possession of some secret information, the key, that opens a back door in these hard computations and allows them to be solved in a small amount of time. Each cryptographic primitive should be designed such that the cost of an attack grows exponentially with the problem size, while the computations using the secret key only grow polynomially. To estimate the strength of a cryptographic primitive it is important to know how hard it is to perform the computation without knowledge of the secret back door and to get an understanding of how much money or time the attacker has to spend. Usually a cryptographic primitive allows the cryptographer to choose parameters that make an attack harder at the cost of making the computations using the secret key harder as well. Therefore designing a cryptographic primitive imposes the dilemma of choosing the parameters strong enough to resist an attack up to a certain cost while choosing them small enough to allow usage of the primitive in the real world, e.g. on small computing devices like smart phones.
: Semka 11-01-2019, 12:19 | : 0 |

: Multiobjective Analysis and Inference of Phylogenetic Hypotheses by Means of Parallel and Bioinspired Computing
: Sergio Santander Jim?nez
: Universidad de Extremadura
: 2015
: pdf
: 271
: 10,3 mb.
: English

One of the most outstanding research topics in the field of bioinformatics is the reconstruction of evolutionary relationships among species. By studying the molecular features of living organisms, phylogenetic inference procedures seek to provide hypotheses about the evolutionary events which led to the current biodiversity in nature. The result of a phylogenetic analysis is given by a treeshaped data structure known as phylogenetic tree, whose topology describes the evolutionary history of the input species by defining ancestor-descendant relationships. The biological quality of the inferred phylogenies is usually evaluated by means of optimality criteria, which allow the modelling of phylogenetic inference as an optimization problem.
: Semka 11-01-2019, 12:19 | : 0 |

.. 1 ... 6 7 8 9 10 11 12 13 14 ... 54

 MirKnig.Su  2021