Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Machine Learning and Robot Perception (Studies in Computational Intelligence)
Machine Learning and Robot Perception (Studies in Computational Intelligence)
This book presents some of the most recent research results in the area of machine learning and robot perception. The book contains eight chapters.

Relevant progress has been done, within the Robotics field, in mechanical systems, actuators, control and planning. This fact, allows a wide application of industrial robots, where
...
101 Boardroom Problems and How to Solve Them
101 Boardroom Problems and How to Solve Them
Before becoming a consultant on meetings and effective decision making, I was employed as an engineer. My motto then was: Silence is golden. Keeping quiet in meetings was safe and risk-free, and rarely did anyone solicit my ideas anyway. Had I shared my input, however, it might have improved the quality of my team’s decisions and reduced its...
Natural Computing: 4th International Workshop on Natural Computing
Natural Computing: 4th International Workshop on Natural Computing

The complex behavior of systems in nature is rooted in intricate mechanisms of interaction that often supersede human-made systems in terms of reliability, power efficiency, and computational capacity. Researchers have begun to realize that natural systems are a great source of inspiration for novel algorithms in computation and communication...

Host Your Web Site In The Cloud: Amazon Web Services Made Easy: Amazon EC2 Made Easy
Host Your Web Site In The Cloud: Amazon Web Services Made Easy: Amazon EC2 Made Easy

Host Your Web Site On The Cloud is the OFFICIAL step-by-step guide to this revolutionary approach to hosting and managing your websites and applications, authored by Amazon's very own Jeffrey Barr.

"Host Your Web Site in the Cloud" shows you just how easy it is to host your website in the cloud with...

Deploying Cisco Voice over IP Solutions
Deploying Cisco Voice over IP Solutions
If you've got a wide area network (WAN) already, putting interoffice voice traffic on it is an obvious application for it. Voice signals take up so little bandwidth, and the cost savings can be so significant, that Voice over IP (VoIP) deserves serious consideration. However, you can easily throw away years of cost savings by bringing in...
How to Build a Business Rules Engine: Extending Application Functionality through Metadata Engineering
How to Build a Business Rules Engine: Extending Application Functionality through Metadata Engineering
Business rules engines can make organizations more agile by allowing them to manage diverse sets of operating rules, such as many different contracts for goods and services with different clients. For example, business rules engines can contain interfaces that allow users to define business rules to add specific functionality to software...
Pulsed Laser Ablation of Solids: Basics, Theory and Applications
Pulsed Laser Ablation of Solids: Basics, Theory and Applications

The book introduces ‘the state of the art' of pulsed laser ablation and its applications. It is based on recent theoretical and experimental studies. The book reaches from the basics to advanced topics of pulsed laser ablation. Theoretical and experimental fundamental phenomena involved in pulsed laser ablation are discussed with...

Channel-Adaptive Technologies and Cross-Layer Designs for Wireless Systems with Multiple Antennas: Theory and Applications
Channel-Adaptive Technologies and Cross-Layer Designs for Wireless Systems with Multiple Antennas: Theory and Applications
Wireless communications is one of the most active areas of research over the
past and the current decades. In fact, the demand for wireless services has been
changing from the regular voice telephony services to mixed voice, data, and
multimedia services over the wireless media. Since the mid-1990s, the wireless
industry has
...
The Fractal Structure of Data Reference: Applications to the Memory Hierarchy
The Fractal Structure of Data Reference: Applications to the Memory Hierarchy
For purposes of understanding its performance, a computer system is traditionally viewed as a processor coupled to one or more disk storage devices, and driven by externally generated requests (typically called transactions). Over the past several decades, very powerful techniques have become available to the performance analyst attempting to...
Multimedia Encryption and Authentication Techniques and Applications (Internet and Communications)
Multimedia Encryption and Authentication Techniques and Applications (Internet and Communications)

Recent advances in digital communications and storage technologies have brought major changes for consumers. High-capacity hard disks and DVDs can store large amounts of audiovisual data. In addition, faster Internet connection speeds and the emerging high bitrate DSL connections provide sufficient bandwidth for entertainment...

Artificial Cognition Systems
Artificial Cognition Systems
The central questions confronting artificial intelligence and cognitive science revolve around the nature of meaning and of mind. Minds are presumed to be the processors of mental content, where that content has the capacity to influence our speech and other behavior. The hard part is figuring out how that is done. Mental states must exercise...
Mathematical Principles of Optical Fiber Communication (CBMS-NSF Regional Conference Series in Applied Mathematics)
Mathematical Principles of Optical Fiber Communication (CBMS-NSF Regional Conference Series in Applied Mathematics)
With the maturing of mobile portable telephony and the emerging broadband access market, greater fiber transmission capacity will be essential in the early 21st century. Since the demand for more capacity drives the development of new optics-based technologies, fiber optics therefore remains a vibrant area for research. Mathematical Principles of...
unlimited object storage image
Result Page: 44 43 42 41 40 39 38 37 36 35 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy