Heurist.org
  • Advanced Search
    • Guest

Uploading...

Please do not refresh the page.
  • Browse
  • Books
  • Hot Books
  • Top Rated Books
  • Discover
  • Categories
  • Series
  • Authors
  • Publishers
  • Languages
  • Ratings
  • File formats
  • Shelves
  • Adam Smith (Public)
  • Arnold Joseph Toynbee (Public)
  • Ayn Rand (Public)
  • Carl Gustav Jung (Public)
  • Charles Dickens (Public)
  • Charles F. Haanel (Public)
  • Charlotte Thompson Iserbyt (Public)
  • ChatGPT (Public)
  • Dante Alighieri (Public)
  • Edmund Burke (Public)
  • Friedrich August Hayek (Public)
  • Fyodor Dostoevsky (Public)
  • Gottfried Willhelm Leibniz (Public)
  • Hans-Hermann Hoppe (Public)
  • Henry Hazlitt (Public)
  • Henry S. George (Public)
  • Hunter Lewis (Public)
  • Ian Nicholas Stewart (Public)
  • John Carson Lennox (Public)
  • John Rogers Searle (Public)
  • John Taylor Gatto (Public)
  • Kenneth E. Wilber (Public)
  • Knowledge Representation (Public)
  • Ludwig von Mises (Public)
  • Mathematica / Wolfram (Public)
  • Milton Friedman (Public)
  • Mortimer Jerome Adler (Public)
  • Murray Newton Rothbard (Public)
  • Nassim Haramein (Public)
  • Nicola Tesla (Public)
  • Peter J. Kreeft (Public)
  • Plotinus (Public)
  • Ronald H. Nash (Public)
  • Rupert Sheldrake (Public)
  • Stephen R. C. HIcks (Public)
  • TeX/LaTeX (Public)
  • Thomas E. Woods Jr. (Public)
  • Thomas Sowell (Public)

Discover (Random Books)

Foundations of Fuzzy Control

Foundations of Fuzzy Control

Jan Jantzen

The Undiscovered Self: with Symbols and the Interpretation of Dreams

The Undiscovered Self: with Symbols and the Interpretation of ...

C. G. Jung

React.js Essentials: A Fast-Paced Guide to Designing and Building Scalable and Maintainable Web Apps With React.js

React.js Essentials: A Fast-Paced Guide to Designing and Building ...

Artemij Fedosejev

A Most Dangerous Method: The Story of Jung, Freud, and Sabina Spielrein

A Most Dangerous Method: The Story of Jung, Freud, and Sabina ...

John Kerr

Autarchies: The Invention of Selfishness

Autarchies: The Invention of Selfishness

David Ashford

Category: Edge Computing

Secure Edge Computing; Applications, Techniques and Challenges

Secure Edge Computing; Applications, Techniques and Challenges

Mohiuddin Ahmed & Paul Haskell-Dowland

Edge Computing: Fundamentals, Advances and Applications

Edge Computing: Fundamentals, Advances and Applications

K. Anitha Kumari & G. Sudha Sadasivam & D. Dharani & M. Niranjanamurthy

Blockchain-Enabled Fog and Edge Computing: Concepts, Architectures and Applications

Blockchain-Enabled Fog and Edge Computing: Concepts, Architectures ...

Muhammad Maaz Rehan & Mubashir Husain Rehmani

Bio-Inspired Optimization in Fog and Edge Computing Environments

Bio-Inspired Optimization in Fog and Edge Computing Environments

Punit Gupta & Dinesh Kumar Saini & Pradeep Rawat & Kashif Zia

5G IoT and Edge Computing for Smart Healthcare

5G IoT and Edge Computing for Smart Healthcare

Bhoi, Akash Kumar;de Albuquerque, Victor Hugo Costa;Sur, Samarendra ...

Multi-Access Edge Computing: Software Development at the Network Edge

Multi-Access Edge Computing: Software Development at the Network ...

Dario Sabella

Textbooks in Telecommunication Engineering (1)

Machine Learning for Edge Computing: Frameworks, Patterns and Best Practices

Machine Learning for Edge Computing: Frameworks, Patterns and ...

Amitoj Singh & Vinay Kukreja & Taghi Javdani Gandomani

Book Details

...