Blockchain Security Analysis: A POMDP-Based Approach for Analyzing Blockchain System Security Against the Long Delay AttackXin ZhouEsauritoAvvisami
Linux: The Ultimate Crash Course to Learn Linux, System Administration, Network Security, and Cloud Computing with Examples aMark ReedEsauritoAvvisami
AI vs. SI, and the Spirit: Contrasting man's nature with that of a computer.Charles CrummerEsauritoAvvisami
Python Programs for Astronomical Solutions: Planetary Positions, Lunar and Solar Eclipses, Pictures, Videos and MapsManohar Narayan PurohitEsauritoAvvisami
Unstructured Data Classification: Uncertain Nearest Neighbor Decision RuleK. ThippeswamyEsauritoAvvisami
Programmer's Python: Async - Threads, processes, asyncio & more: Something Completely DifferentMike JamesEsauritoAvvisami
Advanced Git (Second Edition): Understanding Git Collaboration & WorkflowsRaywenderlich Tutorial TeamEsauritoAvvisami
Logical Data Modeling: An Introduction to the Entity-Relationship ModelGeorge TillmannEsauritoAvvisami
AI And Legal Reasoning Essentials: Practical Advances In Artificial Intelligence And Machine LearningLance EliotEsauritoAvvisami
Quantum Circuits and CompilationOlivia (The University of British Columbia) Di MatteoEsauritoAvvisami
Impact of Soap Opera on Compulsive Buying Behaviour with Special Reference to Palakkad DistrictSaritha PEsauritoAvvisami
Exam 98-361 Software Development Fundamentals Second EditionMicrosoft Official Academic CourseEsauritoAvvisami
Present and Future of Artificial Intelligence: My Approaches, Perspectives and Visions...MD Sadique ShaikhEsauritoAvvisami
Signed Graph Approach in Adaptive Transmission Power to Enhance the Lifetime of Wireless Sensor NetworksS. KannadhasanEsauritoAvvisami