The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Algorithms

Most popular at the top

  • Network Inference in Molecular Biologyby Jesse M. Lingeman; Dennis Shasha

    Springer 2012; US$ 39.95

    Inferring gene regulatory networks is a difficult problem to solve due to the relative scarcity of data compared to the potential size of the networks. While researchers have developed techniques to find some of the underlying network structure, there is still no one-size-fits-all algorithm for every data set. Network Inference in Molecular Biology... more...

  • Engineering Secure Two-Party Computation Protocolsby Thomas Schneider

    Springer 2012; US$ 109.00

    Secure two-party computation, called secure function evaluation (SFE), enables two mutually mistrusting parties, the client and server, to evaluate an arbitrary function on their respective private inputs while revealing nothing but the result. Originally the technique was considered to be too inefficient for practical privacy-preserving applications,... more...

  • Mobile Authenticationby Markus Jakobsson

    Springer 2012; US$ 39.95

    Mobile Authentication: Problems and Solutions looks at human-to-machine authentication, with a keen focus on the mobile scenario. Human-to-machine authentication is a startlingly complex issue. In the old days of computer security-before 2000, the human component was all but disregarded. It was either assumed that people should and would be able to... more...

  • Introduction to Biological Networksby Alpan Raval; Animesh Ray

    Taylor and Francis 2013; US$ 79.95

    The new research area of genomics-inspired network biology lacks an introductory book that enables both physical/computational scientists and biologists to obtain a general yet sufficiently rigorous perspective of current thinking. Filling this gap, Introduction to Biological Networks provides a thorough introduction to genomics-inspired network... more...

  • Mathematik für Ingenieureby Thomas Rießinger

    Springer 2013; US$ 39.99

    Mathematik in entspannter Atmosphäre' ist das Leitbild dieses leicht verständlichen Lehrbuchs. Im Erzählstil und mit vielen Beispielen beleuchtet der Autor nicht nur die Höhere Mathematik, sondern er stellt auch den Lehrstoff in Bezug zu den Anwendungen. Die gesamte für den Ingenieurstudenten wichtige Mathematik wird in... more...

  • A Brief History of Cryptology and Cryptographic Algorithmsby John F Dooley

    Springer 2013; US$ 54.99

    The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems. The conflict between these two halves of cryptology is the story of secret writing. For over 2,000 years, the desire to communicate securely and secretly has resulted... more...

  • Computing Handbook, Third Editionby Heikki Topi; Allen Tucker

    Taylor and Francis 2014; US$ 209.95

    Computing Handbook, Third Edition: Information Systems and Information Technology demonstrates the richness and breadth of the IS and IT disciplines. The second volume of this popular handbook explores their close links to the practice of using, managing, and developing IT-based solutions to advance the goals of modern organizational environments.... more...

  • A New Paradigm of Knowledge Engineering by Soft Computingby Liya Ding

    World Scientific Publishing Company 2001; US$ 225.00

    Soft computing (SC) consists of several computing paradigms, including neural networks, fuzzy set theory, approximate reasoning, and derivative-free optimization methods such as genetic algorithms. The integration of those constituent methodologies forms the core of SC. In addition, the synergy allows SC to incorporate human knowledge effectively,... more...

  • Jewels of Stringologyby Maxime Crochemore; Wojciech Rytter

    World Scientific Publishing Company 2002; US$ 132.00

    The term “stringology” is a popular nickname for text algorithms, or algorithms on strings. This book deals with the most basic algorithms in the area. Most of them can be viewed as “algorithmic jewels” and deserve reader-friendly presentation. One of the main aims of the book is to present several of the most celebrated... more...