Search

Search Results

Results 1-10 of 35 (Search time: 0.207 seconds).
Item hits:
  • Book


  • Authors: 国際交流基金日本語国際センター (2005)

  • 教室で使える日本語の活動を105掲載。初級レベルの日本語をゲーム・聴解・読解・会話・作文などで楽しく学べます。すぐに使えるワークシート・

  • Sách/Book


  • Authors: Bernd Jähne (2005)

  • Firstly, the whole textbook is now clearly partitioned into basic and advanced material in order to cope with the ever-increasing field of digital image processing. The most important equations are put into framed boxes. The advanced sections are located in the second part of each chapter and are marked by italic headlines and by a smaller typeface. In this way, you can first work your way through the basic principles of digital image processing without getting overwhelmed by the wealth of the material. You can extend your studies later to selected topics of interest.

  • Sách/Book


  • Authors: Nancy L. Leech (2005)

  • Designed to help students learn to analyze and interpret research data using intermediate statistics, this new edition features SPSS 12.0 for Windows, but can also be used with earlier versions. Each chapter introduces several related statistics and provides instructions on how to run them and interpret the outputs. The authors describe the use and interpretation of these statistics in user-friendly, non-technical language. The authors demonstrate how to choose the appropriate statistic based on the research design, how to use SPSS to answer research questions, and how to interpret and write about SPSS outputs. SPSS for Intermediate Statistics, 2/e provides unique learning tools.

  • Sách/Book


  • Authors: Joseph Migga Kizza (2005)

  • A comprehensive survey of computer network security concepts, methods, and practices. This authoritative volume provides an optimal description of the principles and applications of computer network security in particular, and cyberspace security in general. The book is thematically divided into three segments: Part I describes the operation and security conditions surrounding computer networks; Part II builds from there and exposes readers to the prevailing security situation based on a constant security threat; and Part III - the core - presents readers with most of the best practices and solutions currently in use. It is intended as both a teaching tool and reference. This broad-ranging text/reference comprehensively surveys computer network security concepts, methods, and practi...

  • Sách/Book


  • Authors: Barry Wilkinson (2005)

  • The book covers the timely topic of cluster programming, interesting to many programmers due to the recent availability of low-cost computers. Uses MPI pseudocodes to describe algorithms and allows different programming tools to be implemented, and provides readers with thorough coverage of shared memory programming, including Pthreads and OpenMP. Useful as a professional reference for programmers and system administrators.