Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
Game Theory at Work: How to Use Game Theory to Outthink and Outmaneuver Your Competition
Game Theory at Work: How to Use Game Theory to Outthink and Outmaneuver Your Competition

Game theory—the study of how competitors act, react, and interact in the strategic pursuit of their own self-interest—has become an essential competitive tool in today’s business arena. Game Theory at Work provides examples of how businesspeople can use this time-proven approach to successfully meet competitive...

Domain-Driven Design: Tackling Complexity in the Heart of Software
Domain-Driven Design: Tackling Complexity in the Heart of Software

The software development community widely acknowledges that domain modeling is central to software design. Through domain modeling, software developers are able to express rich functionality and translate that functionality into software implementation that truly serves the needs of its users. Despite its obvious importance,...

Mathematical Models of Spoken Language
Mathematical Models of Spoken Language
Humans use language to convey meaningful messages to each other. Linguistic competence consists in the ability to express meaning reliably, not simply to obtain faithful lexical transcriptions. This invaluable reference tool is the product of many years' experience and research on language and speech technology. It presents the motivations for,...
Data Structures and Algorithms (Software Engineering and Knowledge Engineering, 13)
Data Structures and Algorithms (Software Engineering and Knowledge Engineering, 13)

This is an excellent, up-to-date and easy-to-use text on data structures and algorithms that is intended for undergraduates in computer science and information science. The thirteen chapters, written by an international group of experienced teachers, cover the fundamental concepts of algorithms and most of the important data structures as...

Handbook of Graph Theory
Handbook of Graph Theory
Over tlid- past forty years, graph theory has been one of the most rapidly growing areas of mathematics. Siuee 19oO, more than 10.000 different authors have published papers classified as graph l he or у by XI nth Reviews, and for the past decade, over 1000 graph theory papers have been published each year.

litis
...
Al Application Programming
Al Application Programming

The purpose of this book is to demystify the techniques associated with the field of artificial intelligence. It will cover a wide variety of techniques currently defined as "AI" and show how they can be useful in practical, everyday applications.

Many books on artificial intelligence provide tutorials for AI methods, but...

Electric Wiring: Domestic, Twelfth Edition
Electric Wiring: Domestic, Twelfth Edition
Electric Wiring Domestic is the definitive guide to home wiring to professional standards. This makes it ideal for serious DIY work, especially for letting or resale, and essential reading for professionals who are not trained electricians, undertaking the wiring work involved in plumbing, central heating, security alarms,...
The Facts on File Algebra Handbook (Science Handbook)
The Facts on File Algebra Handbook (Science Handbook)
The mathematics that we teach and learn today includes concepts and ideas that once were pondered only by the most brilliant men and women of ancient, and not so ancient, times. Numbers such as 1,000, for example, or two, or zero, were at one time considered very abstract ideas. There was a time when a quantity more than two or three was simply...
Database Design Using Entity-Relationship Diagrams (Foundations of Database Design, 1)
Database Design Using Entity-Relationship Diagrams (Foundations of Database Design, 1)

Database Design Using Entity-Relationship Diagrams clarifies ER diagram design by defining it in terms of requirements (end user requests) and specifications (designer feedback to that request). The book emphasizes how communication between designers and users during design is crucial for the elicitation of targeted data, and for the creation of...

Internet Security: Cryptographic Principles, Algorithms and Protocols
Internet Security: Cryptographic Principles, Algorithms and Protocols
Cryptography is the key to securing the Internet

If every communication network were to use a secure system based on encryption, then viruses, worms and hackers would have a very hard time. Unfortunately, this scenario does not reflect the reality of the Internet world today. However, with security issues becoming more and more important...

Budgeting for Managers
Budgeting for Managers
Iremember the first time I made a budget. I had just started a new job, my first time as a manager. My boss, the dean of the school, said, “Sid, we have $50,000 to spend on computer systems this year. Please prepare a budget.”

Wow! All the exercises in school, all my thinking as I started the job and wrote out a plan for my
...
The Constants of Nature: From Alpha to Omega--the Numbers That Encode the Deepest Secrets of the Universe
The Constants of Nature: From Alpha to Omega--the Numbers That Encode the Deepest Secrets of the Universe
A major contribution to our understanding of the basic laws of the universe -- from the author of The Book of Nothing.

The constants of nature are the fundamental laws of physics that apply throughout the universe: gravity, velocity of light, electromagnetism and quantum mechanics. They encode the deepest secrets of the...

Result Page: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next 
©2017 LearnIT (support@pdfchm.net) - Privacy Policy