The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Data structures

Most popular at the top

  • Combinatorial Mapsby Guillaume Damiand; Pascal Lienhardt

    CRC Press 2014; US$ 99.95

    "An excellent technical teaching tool, especially recommended for college library mathematics and computer science shelves." ? Midwest Book Review , January 2015 "Guillaume Damiand and Pascal Lienhardt have produced an excellent book that discusses in full details a family of data structures for representing explicitly the connectivity of low-dimensional... more...

  • Cryptography in Constant Parallel Timeby Benny Applebaum

    Springer 2013; US$ 109.00

    Locally computable (NC0) functions are 'simple' functions for which every bit of the output can be computed by reading a small number of bits of their input. The study of locally computable cryptography attempts to construct cryptographic functions that achieve this strong notion of simplicity and simultaneously provide a high level of security. Such... more...

  • Data Structures, Computer Graphics, and Pattern Recognitionby A. Klinger; K. S. Fu; T. L. Kunii

    Elsevier Science 2014; US$ 93.95

    Data Structures, Computer Graphics, and Pattern Recognition focuses on the computer graphics and pattern recognition applications of data structures methodology. This book presents design related principles and research aspects of the computer graphics, system design, data management, and pattern recognition tasks. The topics include the data structure... more...

  • Frontiers of Higher Order Fuzzy Setsby Alireza Sadeghian; Hooman Tahayori

    Springer New York 2014; US$ 179.00

    Providing a unified representation theorem for higher-order fuzzy sets, this volume elaborates on the concept of gradual elements and their integration with these sets, as well as discussing their applications in a range of fields, some of which are new. more...

  • Computational Red Teamingby Hussein A. Abbass

    Springer International Publishing 2014; US$ 129.00

    Written to bridge the information needs of management and computational scientists, this book presents the first comprehensive treatment of Computational Red Teaming (CRT).  The author describes an analytics environment that blends human reasoning and computational modeling to design risk-aware and evidence-based smart decision making systems. He... more...

  • Authentication in Insecure Environmentsby Sebastian Pape

    Springer Fachmedien Wiesbaden 2014; US$ 109.00

    Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the other hand, users may not want to be tracked while their service provider does not want them to share their credentials. Many users may not be able to determine whether... more...

  • Kryptologieby Albrecht Beutelspacher

    Springer Fachmedien Wiesbaden 2014; US$ 29.95

    Das Buch bietet eine reich illustrierte, leicht verdauliche und amüsante Einführung in die Kryptologie. Diese Wissenschaft beschäftigt sich damit, Nachrichten vor unbefugtem Lesen und unberechtigter Änderung zu schützen. Ein besonderer Akzent liegt auf der Behandlung moderner Entwicklungen. Dazu gehören Sicherheit im Handy, elektronisches Geld, Zugangskontrolle... more...

  • Modeling & Simulation-Based Data Engineeringby Bernard P. Zeigler; Phillip E Hammonds

    Elsevier Science 2007; US$ 103.00

    Data Engineering has become a necessary and critical activity for business, engineering, and scientific organizations as the move to service oriented architecture and web services moves into full swing. Notably, the US Department of Defense is mandating that all of its agencies and contractors assume a defining presence on the Net-centric Global Information... more...

  • Ontologies for Software Engineering and Software Technologyby Coral Calero; Francisco Ruiz; Mario Piattini

    Springer 2006; US$ 159.00

    Covers two applications of ontologies in software engineering and software technology: sharing knowledge of the problem domain and using a common terminology among all stakeholders; and filtering the knowledge when defining models and metamodels. This book is of benefit to software engineering researchers in both academia and industry. more...

  • Multimedia Processing, Communication and Computing Applicationsby Punitha P. Swamy; Devanur S. Guru

    Springer 2013; US$ 179.00

    ICMCCA 2012 is the first International Conference on Multimedia Processing, Communication and Computing Applications and the theme of the Conference is chosen as ‘Multimedia Processing and its Applications’. Multimedia processing has been an active research area contributing in many frontiers of today’s science and technology. This book... more...