This book constitutes the refereed proceedings of the 16th National Conference on Computer Engineering and Technology, NCCET 2012, held in Shanghai, China, in August 2012.
This book constitutes the refereed proceedings of the 16th International Symposium on VSLI Design and Test, VDAT 2012, held in Shibpur, India, in July 2012.
This book constitutes the refereed proceedings of the SecondInternational Conference on Advances in Power Electronics andInstrumentation Engineering, PEIE 2011, held at Nagpur, India, in April2011.
This book contains the best papers of the International Conference on Advances in Power Electronics and Instrumentation Engineering, PEIE 2010, organized by the Association of Computer Electronics and Electrical Engineers (ACEEE), during September 7-9, 2010 in Kochi, Kerala, India.
This book constitutes the revised papers of the 14th International Workshop on Job Scheduling Strategies for Parallel Processing, JSSPP 2009, which was held in Rome, Italy, in May 2009.
This book constitutes the refereed proceedings of the 5th International Workshop on Applied Reconfigurable Computing, ARC 2009, held in Karlsruhe, Germany, in March 2009.
Domain decomposition is an active, interdisciplinary research area that is devoted to the development, analysis and implementation of coupling and decoupling strategies in mathematics, computational science, engineering and industry.
Power consumption has become a critical concern in RF/mm-wave integrated circuit (IC) design thanks to new applications from 5G, mobile computing, artificial intelligence, and the Internet of Things.
Power consumption has become a critical concern in RF/mm-wave integrated circuit (IC) design thanks to new applications from 5G, mobile computing, artificial intelligence, and the Internet of Things.
Master the complete Generative AI project lifecycle on Kubernetes (K8s) from design and optimization to deployment using best practices, cost-effective strategies, and real-world examples.
Get to grips with the Model Context Protocol (MCP) and learn how to build scalable, intelligent web applications with AI-ready architecture in PythonKey FeaturesThe only resource you'll need to build, test, and deploy MCP servers and clientsTake a modern approach toward building, testing, and securing distributed agentic AI appsGet clear, professional guidance on developing for both LLM and non-LLM clientsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionLearn Model Context Protocol with Python introduces developers, architects, and AI practitioners to the transformative capabilities of Model Context Protocol (MCP), an emerging protocol designed to standardize, distribute, and scale AI-driven applications.
Get to grips with the Model Context Protocol (MCP) and learn how to build scalable, intelligent web applications with AI-ready architecture in PythonKey FeaturesThe only resource you'll need to build, test, and deploy MCP servers and clientsTake a modern approach toward building, testing, and securing distributed agentic AI appsGet clear, professional guidance on developing for both LLM and non-LLM clientsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionLearn Model Context Protocol with Python introduces developers, architects, and AI practitioners to the transformative capabilities of Model Context Protocol (MCP), an emerging protocol designed to standardize, distribute, and scale AI-driven applications.
The book Anatomy of IoT Botnets and Detection Methods delves into the evolving landscape of cybersecurity threats associated with the Internet of Things (IoT), specifically focusing on the anatomy, behavior, and detection of IoT-based botnets.
The book aims to develop methodologies and throw light on the advances in empirical research of various machine learning systems through data mining and parallel programming using GPU approaches.
The book Anatomy of IoT Botnets and Detection Methods delves into the evolving landscape of cybersecurity threats associated with the Internet of Things (IoT), specifically focusing on the anatomy, behavior, and detection of IoT-based botnets.
The book aims to develop methodologies and throw light on the advances in empirical research of various machine learning systems through data mining and parallel programming using GPU approaches.
This book introduces foundational and advanced concepts in artificial intelligence (AI) and machine learning (ML), focusing on their real-world applications and societal implications.
This book explores the nuances of making the narrative and graphical content of instructions - an important part of a medical product's user interface - safe, effective, and satisfying to use.
ESG impacts businesses globally, and today it is interconnected with all aspects of business, including, but not limited to, human resources, labor issues, risk management, regulatory compliance, establishing strategic direction, and areas impacted by climate change.
ESG impacts businesses globally, and today it is interconnected with all aspects of business, including, but not limited to, human resources, labor issues, risk management, regulatory compliance, establishing strategic direction, and areas impacted by climate change.
Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills.
This book introduces foundational and advanced concepts in artificial intelligence (AI) and machine learning (ML), focusing on their real-world applications and societal implications.
Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills.
Nonlocal Quantum Computing Theory offers a fresh perspective on quantum computing, moving beyond the traditional qubit-based approach to a physics-driven interpretation of computation.
Nonlocal Quantum Computing Theory offers a fresh perspective on quantum computing, moving beyond the traditional qubit-based approach to a physics-driven interpretation of computation.