Browse Items (21 total)

  • Collection: 000 Computer Science, Information & General Works

Computational fluid dynamics (CFD) is the main field of computational mechanics that has historically benefited from advances in high-performance computing. High-performance computing involves several techniques to make a simulation efficient and…

1006971.pdf.jpg
This This book is open access under a CC BY 4.0 license. This book offers a comprehensive guide, covering every important aspect of computational thinking education. It provides an in-depth discussion of computational thinking, including the notion…

9781315208787.jpg
From the Foreword:

"This book lays out much of what we’ve learned at AT&T about SDN and NFV. Some of the smartest network experts in the industry have drawn a map to help you navigate this journey. Their goal isn’t to predict the future but to…

978-3-662-66769-9.jpg
In diesem Open-Access-Tagungsband sind die besten Beiträge des 8. Jahreskolloquiums "Bildverarbeitung in der Automation" (BVAu 2022) enthalten. Das Kolloquium fand am 02. November 2022 auf dem Innovation Campus Lemgo statt. Die vorgestellten neuesten…

Transformation.jpg
Almost all aspects of the historian's research workflow have been transformed by digital technology. The Transformation of Historical Research in the Digital Age equips historians to be self-conscious practitioners by making these shifts explicit and…

A-New-Approach-to-Research.jpg
Ethics and Academic Research examines both theories of ethical decision-making as well as apply those theories to a broad range of situations and questions within a research career and process. The focus is not only on what is wrong, or in doing the…

managing digital in africa 2.jpg
Managing Digital Records in Africa draws on the research work of the InterPARES Trust (ITrust) project that investigated interrelated archival issues focusing on legal analysis, infrastructure, trust, authentication, and education within the African…

images.jpg
Nonlocality was discovered by John Bell in 1964, in the context of the debates about quantum theory, but is a phenomenon that can be studied in its own right. Its observation proves that measurements are not revealing pre-determined values,…

buku 4.jpg
In recent years, the rising complexity of Internet of Things (IoT) systems has increased their potential vulnerabilities and introduced new cybersecurity challenges. In this context, state of the art methods and technologies for security risk…
Output Formats

atom, csv, dcmes-xml, json, omeka-xml, rss2