Home | Amazing | Today | Tags | Publishers | Years | Search 
Deep Learning with Python: Learn Best Practices of Deep Learning Models with PyTorch
Deep Learning with Python: Learn Best Practices of Deep Learning Models with PyTorch
Master the practical aspects of implementing deep learning solutions with PyTorch, using a hands-on approach to understanding both theory and practice. This updated edition will prepare you for applying deep learning to real world problems with a sound theoretical foundation and practical know-how with PyTorch, a platform developed by...
Python Deep Learning: Exploring deep learning techniques and neural network architectures with PyTorch, Keras, and TensorFlow, 2nd Edition
Python Deep Learning: Exploring deep learning techniques and neural network architectures with PyTorch, Keras, and TensorFlow, 2nd Edition

Learn advanced state-of-the-art deep learning techniques and their applications using popular Python libraries

Key Features

  • Build a strong foundation in neural networks and deep learning with Python libraries
  • Explore advanced deep learning techniques and their applications...
Computability Theory: An Introduction to Recursion Theory
Computability Theory: An Introduction to Recursion Theory

The study of the class of computable partial functions (i.e., recursive partial functions) stands at the intersection of three fields: mathematics, theoretical computer science, and philosophy.

Mathematically, computability theory originates from the concept of an algorithm. It leads to a classification of functions according...

An Introduction to Parallel Programming
An Introduction to Parallel Programming

Parallel hardware has been ubiquitous for some time now. It’s difficult to find a laptop, desktop, or server that doesn’t use a multicore processor. Beowulf clusters are nearly as common today as high-powered workstations were during the 1990s, and cloud computing could make distributed-memory systems as accessible as...

Java™ for Programmers (2nd Edition) (Deitel Developer Series)
Java™ for Programmers (2nd Edition) (Deitel Developer Series)

Welcome to Java—the world’s most widely used computer programming language. In this book, you’ll learn object-oriented programming—today’s key programming methodology.

You’ll create and work with many software objects in this text.

Java is the preferred language for meeting many...

iOS SDK Programming A Beginners Guide
iOS SDK Programming A Beginners Guide

Response to the iPhone, the iPod touch, and now the iPad has been nothing short of overwhelming. The App Store has captured the hobbyist’s imagination like no other platform in recent memory. Hobbyists have made—and will continue to make—money from their creations sold on the App Store. And we aren’t necessarily...

How to Cheat in 3ds Max 2011: Get Spectacular Results Fast
How to Cheat in 3ds Max 2011: Get Spectacular Results Fast

THE TECHNIQUES DESCRIBED in this book assume a basic grasp of 3ds Max. But with so many options to choose from, it’s easy to get lost in all the tools, buttons, and menus.

Not all features are created equal. This chapter goes over the fundamentals of 3ds Max with an eye toward the most important tools and how you...

Fractal Image Compression: Theory and Application
Fractal Image Compression: Theory and Application

What is "Fractal Image Compression" anyway? You will have to read (he book to find out everything about it, and if you read the book, you really will find out almost everything that is currently known about it. In a sentence or two: fractal image compression is a method, or class of methods, that allows images to be stored on...

Modern Computer Arithmetic (Cambridge Monographs on Applied and Computational Mathematics)
Modern Computer Arithmetic (Cambridge Monographs on Applied and Computational Mathematics)

This is a book about algorithms for performing arithmetic, and their implementation on modern computers. We are concerned with software more than hardware – we do not cover computer architecture or the design of computer hardware since good books are already available on these topics. Instead, we focus on algorithms for...

Error Correction Codes for Non-Volatile Memories
Error Correction Codes for Non-Volatile Memories

Nowadays it is hard to find an electronic device which does not use codes: for example, we listen to music via heavily encoded audio CD's and we watch movies via encoded DVD's. There is at least one area where the use of encoding/decoding is not so developed, yet: Flash non-volatile memories. Flash memory high-density, low power, cost...

VCP4 Exam Cram: VMware Certified Professional (2nd Edition)
VCP4 Exam Cram: VMware Certified Professional (2nd Edition)

Virtualization is one of the hottest topics in the tech industry today. The leader in the virtualization space at the present time is without a doubt VMware with its virtual infrastructure offering. As VMware software began to take its place in the data center and demand respect in the industry, the need for a...

A Guide to Kernel Exploitation: Attacking the Core
A Guide to Kernel Exploitation: Attacking the Core

The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop...

Result Page: 98 97 96 95 94 93 92 91 90 89 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy