Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hebbian Learning and Negative Feedback Networks (Advanced Information and Knowledge Processing)
Hebbian Learning and Negative Feedback Networks (Advanced Information and Knowledge Processing)
From the reviews of the first edition:

"This book is concerned with developing unsupervised learning procedures and building self organizing network modules that can capture regularities of the environment. the book provides a detailed introduction to Hebbian learning and negative feedback neural networks and is suitable for...

Understanding 3D Animation Using Maya (Book with CD)
Understanding 3D Animation Using Maya (Book with CD)
Many animators and designers would like to supplement their Maya learning with a less-technical, more helpful book. This new self-study manual is both a general guide for understanding 3-D computer graphics and a specific guide for learning the fundamentals of Maya: workspace, modeling, animation, shading, lighting, and rendering.

This...

Object-Oriented Metrics in Practice: Using Software Metrics to Characterize, Evaluate, and Improve the Design of Object-Oriented Systems
Object-Oriented Metrics in Practice: Using Software Metrics to Characterize, Evaluate, and Improve the Design of Object-Oriented Systems
This book is not about metrics per se. It is about the way metrics can be used in practice to aid us in characterizing software systems, to evaluate their design and when we detect design problems to provide the appropriate refactorings.

The goal of this book is to help you characterize, evaluate and improve the design of the large
...
Security, Privacy and Trust in Modern Data Management (Data-Centric Systems and Applications)
Security, Privacy and Trust in Modern Data Management (Data-Centric Systems and Applications)
The vision of ubiquitous computing and ambient intelligence describes a world of technology which is present anywhere, anytime in the form of smart, sensible devices that communicate with each other and provide personalized services. However, associated with these benefits are concerns with respect to security issues. Open interconnected systems...
Formal Correctness of Security Protocols (Information Security and Cryptography)
Formal Correctness of Security Protocols (Information Security and Cryptography)
Computer network security is critical to fraud prevention and accountability. Network participants are required to observe predefined steps called security protocols, whose proof of correctness is evidence that each protocol step preserves some desired properties.

The author investigates proofs of correctness of realistic security protocols in...

Object-Oriented Programming Languages: Interpretation (Undergraduate Topics in Computer Science)
Object-Oriented Programming Languages: Interpretation (Undergraduate Topics in Computer Science)
This comprehensive examination of the main approaches to object-oriented language explains the key features of the languages in use today. Class-based, prototypes and Actor languages are all looked at and compared in terms of their semantic concepts. In providing such a wide-ranging comparison, this book provides a unique overview of the main...
Knowledge Management Systems: Information and Communication Technologies for Knowledge Management
Knowledge Management Systems: Information and Communication Technologies for Knowledge Management
The transformation of organizations into knowledge-intensive and knowledgeaware organizations takes place at an ever-increasing pace. Knowledge as the key resource, not labor, raw material or capital, changes production functions in organizations significantly. Knowledge represents the key concept to explain the increasing velocity of the...
Data-Driven 3D Facial Animation
Data-Driven 3D Facial Animation
Data-Driven 3D Facial Animation systematically describes the important techniques developed over the last ten years or so. Although 3D facial animation is used more and more in the entertainment industries, to date there have been very few books that address the techniques involved.

Comprehensive in scope, the book covers not only traditional...

Computational Intelligence in Economics and Finance: Volume II
Computational Intelligence in Economics and Finance: Volume II
Computational intelligence (CI), as an alternative to statistical and econometric approaches, has been applied to a wide range of economics and finance problems in recent years, for example to price forecasting and market efficiency.

This book contains research ranging from applications in financial markets and business administration to...

Introduction to Cryptography: Principles and Applications
Introduction to Cryptography: Principles and Applications
Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data.

In the first part, this book covers the key concepts of cryptography on an...

Grid Computing: Software Environments and Tools
Grid Computing: Software Environments and Tools
Grid computing combines aspects from parallel computing, distributed computing and data management, and has been playing an important role in pushing forward the state-of-the-art in computer science and information technologies. There is considerable interest in Grid computing at present, with a significant number of Grid projects being launched...
Grid Computing Security
Grid Computing Security
Grid computing is widely regarded as a technology of immense potential in both industry and academia. Yet many enterprises are still hesitant about the implementation of an enterprise-level grid system, due to the lack of consistent and widely used standards. Security is probably the most important concern and needs both close understanding and...
Result Page: 393 392 391 390 389 388 387 386 385 384 383 382 381 380 379 378 377 376 375 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy