|
|
|
|
Geographic Data Mining and Knowledge Discovery, Second Edition
Similar to many research and application fields, geography has moved from a datapoor and computation-poor to a data-rich and computation-rich environment. The scope, coverage, and volume of digital geographic datasets are growing rapidly. Public and private sector agencies are creating, processing, and disseminating digital data on land use,... | | The Compiler Design Handbook: Optimizations & Machine Code Generation
In the last few years, changes have had a profound influence on the problems addressed by compiler designers. First, the proliferation in machine architectures has necessitated the fine-tuning of compiler back ends to exploit features such as multiple memory banks, pipelines and clustered architectures. These features provide potential for... | | Real Life Applications of Soft Computing
Soft computing has been a major field of development in the previous couple of decades. The field attracts the attention of a large number of people. The highly multidisciplinary nature of the field further results in a large number of students studying soft computing. The various developments in application areas of soft computing in the... |
|
Bayesian Artificial Intelligence, Second Edition
Updated and expanded, Bayesian Artificial Intelligence, Second Edition provides a practical and accessible introduction to the main concepts, foundation, and applications of Bayesian networks. It focuses on both the causal discovery of networks and Bayesian inference procedures. Adopting a causal interpretation of Bayesian... | | Data Mining with R: Learning with Case Studies
The versatile capabilities and large set of add-on packages make R an excellent alternative to many existing and often expensive data mining tools. Exploring this area from the perspective of a practitioner, Data Mining with R: Learning with Case Studies uses practical examples to illustrate the power of R and data... | | The Top Ten Algorithms in Data Mining
Identifying some of the most influential algorithms that are widely used in the data mining community, The Top Ten Algorithms in Data Mining provides a description of each algorithm, discusses its impact, and reviews current and future research. Thoroughly evaluated by independent reviewers, each chapter focuses on a... |
|
|
Handbook of Financial Cryptography and Security
Cryptography has made a peculiar journey to become a modern science. It had long been
associated with the military and with magic. The rst published work in the eld was
Steganographia, by an alchemist named Trithemius. Although written earlier, the book was
published in 1606. Cryptography has continued this connection with the arcane... | | Telecommunications Engineering
Since the publication of the second edition of this highly acclaimed textbook, telecommunications has progressed at a rapid rate. Major advances continue to occur in mobile communications and broadband digital networks and services, sophisticated signal processing techniques are prevalent at increasingly higher bit rates, and digital systems... | | Numerical Methods, Algorithms and Tools in C#
Today, more than at any other time in the history of mankind, computers are increasingly
and successfully being exploited to gain a better understanding of our physical
world and as a result, also deepen our appreciation and reverence for God’s Creation.
Consequently, as computers evolve, so must the means to control them through... |
|
|
Result Page: 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 |