The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Algorithms

Most popular at the top

  • Engineering Secure Two-Party Computation Protocolsby Thomas Schneider

    Springer 2012; US$ 109.00

    Secure two-party computation, called secure function evaluation (SFE), enables two mutually mistrusting parties, the client and server, to evaluate an arbitrary function on their respective private inputs while revealing nothing but the result. Originally the technique was considered to be too inefficient for practical privacy-preserving applications,... more...

  • Mobile Authenticationby Markus Jakobsson

    Springer 2012; US$ 39.95

    Mobile Authentication: Problems and Solutions looks at human-to-machine authentication, with a keen focus on the mobile scenario. Human-to-machine authentication is a startlingly complex issue. In the old days of computer security-before 2000, the human component was all but disregarded. It was either assumed that people should and would be able to... more...

  • Mathematik für Ingenieureby Thomas Rießinger

    Springer 2013; US$ 39.99

    Mathematik in entspannter Atmosphäre' ist das Leitbild dieses leicht verständlichen Lehrbuchs. Im Erzählstil und mit vielen Beispielen beleuchtet der Autor nicht nur die Höhere Mathematik, sondern er stellt auch den Lehrstoff in Bezug zu den Anwendungen. Die gesamte für den Ingenieurstudenten wichtige Mathematik wird in... more...

  • A Brief History of Cryptology and Cryptographic Algorithmsby John F Dooley

    Springer 2013; US$ 54.99

    The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems. The conflict between these two halves of cryptology is the story of secret writing. For over 2,000 years, the desire to communicate securely and secretly has resulted... more...

  • Introduction to Biological Networksby Alpan Raval; Animesh Ray

    Taylor and Francis 2013; US$ 79.95

    The new research area of genomics-inspired network biology lacks an introductory book that enables both physical/computational scientists and biologists to obtain a general yet sufficiently rigorous perspective of current thinking. Filling this gap, Introduction to Biological Networks provides a thorough introduction to genomics-inspired network... more...

  • Jewels of Stringologyby Maxime Crochemore; Wojciech Rytter

    World Scientific Publishing Company 2002; US$ 132.00

    The term “stringology” is a popular nickname for text algorithms, or algorithms on strings. This book deals with the most basic algorithms in the area. Most of them can be viewed as “algorithmic jewels” and deserve reader-friendly presentation. One of the main aims of the book is to present several of the most celebrated... more...

  • Numerical Simulations of Incompressible Flowsby M. M. Hafez

    World Scientific Publishing Company 2003; US$ 305.00

    This book consists of 37 articles dealing with simulation of incompressible flows and applications in many areas. It covers numerical methods and algorithm developments as well as applications in aeronautics and other areas. It represents the state of the art in the field. Contents: Navier–Stokes Solvers; Projection Methods; Finite Element Methods;... more...

  • A New Paradigm of Knowledge Engineering by Soft Computingby Liya Ding

    World Scientific Publishing Company 2001; US$ 225.00

    Soft computing (SC) consists of several computing paradigms, including neural networks, fuzzy set theory, approximate reasoning, and derivative-free optimization methods such as genetic algorithms. The integration of those constituent methodologies forms the core of SC. In addition, the synergy allows SC to incorporate human knowledge effectively,... more...

  • Bandit Algorithms for Website Optimizationby John Myles White

    O'Reilly Media 2012; US$ 15.99

    When looking for ways to improve your website, how do you decide which changes to make? And which changes to keep? This concise book shows you how to use Multiarmed Bandit algorithms to measure the real-world value of any modifications you make to your site. Author John Myles White shows you how this powerful class of algorithms can help you boost... more...