Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Algorithms and Architectures of Artificial Intelligence (Frontiers in Artificial Intelligence and Applications)
Algorithms and Architectures of Artificial Intelligence (Frontiers in Artificial Intelligence and Applications)
This book gives an overview of methods developed in artificial intelligence for search, learning, problem solving and decision-making. It gives an overview of algorithms and architectures of artificial intelligence that have reached the degree of maturity when a method can be presented as an algorithm, or when a well-defined architecture is known,...
Artificial Intelligence in Education:  Building Technology Rich Learning Contexts that Work
Artificial Intelligence in Education: Building Technology Rich Learning Contexts that Work
The 13th International Conference on Artificial Intelligence in Education (AIED-2007) is being held July 9–13, 2007, in Los Angeles, California. AIED Conferences are organized by the International AIED Society on a biennial basis. The goal of the International Artificial Intelligence in Education (AIED) Society is to advance knowledge and...
Designing Mobile Service Systems (Research in Design Series)
Designing Mobile Service Systems (Research in Design Series)
This book is the second in the Research in Design series. Design is an effort that enjoys a growing attention in the academic world. At Delft University of Technology design is a recognized part of science. Like other technical universities, Delft is rooted in the engineering field. And in spite of questions like ‘what is design’,...
Proof Technology and Computation, Volume 200 NATO Science Series: Computer and Systems Sciences (Nato Science)
Proof Technology and Computation, Volume 200 NATO Science Series: Computer and Systems Sciences (Nato Science)
Proof technology will become an established field in software engineering. It generally aims at integrating proof processing into industrial design and verifications tools. The origins of this technology lie in the systematic understanding of a fully-fledged, precise notion of proof by mathematics and logics. Using this profound understanding,...
Communicating Process Architectures 2005 (Concurrent Systems Engineering Series)
Communicating Process Architectures 2005 (Concurrent Systems Engineering Series)
The awareness of the ideas characterized by Communicating Processes Architecture and their adoption by industry beyond their traditional base in safety-critical systems and security is growing. The complexity of modern computing systems has become so great that no one person – maybe not even a small team – can understand all aspects and...
Advances in Artificial General Intelligence: Concepts, Architectures and Algorithms (Frontiers in Artificial Intelligence and Applications)
Advances in Artificial General Intelligence: Concepts, Architectures and Algorithms (Frontiers in Artificial Intelligence and Applications)
The topic of this book - the creation of software programs displaying broad, deep, human-style general intelligence - is a grand and ambitious one. And yet it is far from a frivolous one: what the papers in this publication illustrate is that it is a fit and proper subject for serious science and engineering exploration. No one has yet created a...
Advances in Mathematical Modeling for Reliability
Advances in Mathematical Modeling for Reliability
Advances in Mathematical Modeling for Reliability discusses fundamental issues on mathematical modeling in reliability theory and its applications. Beginning with an extensive discussion of graphical modeling and Bayesian networks, the focus shifts towards repairable systems: a discussion about how sensitive availability calculations parameter...
Ontology and the Semantic Web:  Volume 156 Frontiers in Artificial Intelligence and Applications
Ontology and the Semantic Web: Volume 156 Frontiers in Artificial Intelligence and Applications
In order for information systems supporting two different organizations to interoperate, there must be an agreement as to what the words mean. There are many such agreements in place, supporting information systems interoperation in many different application areas. Most of these agreements have been created as part of diverse systems development...
Adaptive Web Sites: A Knowledge Extraction from Web Data Approach - Volume 170 Frontiers in Artificial Intelligence and Applications
Adaptive Web Sites: A Knowledge Extraction from Web Data Approach - Volume 170 Frontiers in Artificial Intelligence and Applications
This book can be presented in two different ways; introducing a particular methodology to build adaptive Web sites and; presenting the main concepts behind Web mining and then applying them to adaptive Web sites. In this case, adaptive Web sites is the case study to exemplify the tools introduced in the text. The authors start by introducing the...
Broadband Internet Deployment in Japan (Advanced Information Technology)
Broadband Internet Deployment in Japan (Advanced Information Technology)
Japan is well-known as the country where the penetration ratio of the intelligent cellular phone system is large. In 2007, it was reported that in the cellular phone system in Japan, the total volume of data traffic became larger than that of voice traffic. Now, the telecommunication infrastructure is going to be converged with broadcasting...
Thinking Fluid Dynamics With Dolphins (Stand Alone)
Thinking Fluid Dynamics With Dolphins (Stand Alone)
This small volume is the English edition of a Japanese book entitled "Learning fluid dynamics from dolphins". The title is derived from the fact that "Dolphins swim too fast to be explained scientifically". The first person to clearly describe this phenomenon was the English biologist Sir James Gray (J.Gray, 1936), and...
Boolean Functions in Cryptology and Information Security (Nato Science for Peace and Security)
Boolean Functions in Cryptology and Information Security (Nato Science for Peace and Security)
This book contains the proceedings of the NATO-Russia Advanced Study Institute (ASI) 'Boolean Functions in Cryptology and Information Security', which was held in Zvenigorod, Moscow region, Russia. These proceedings consist of three parts. The first part contains survey lectures on various areas of Boolean function theory that are of primary...
unlimited object storage image
Result Page: 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy