|
|
Automatic Ambiguity Resolution in Natural Language Processing
Natural language processing is often called an "Al-complete" task, in the sense that in order to truly process language (i.e. to comprehend, to translate, to generate) full understanding is required, which is itself the ultimate goal of Artificial Intelligence. For those who seek solutions to practical problems, this is not a... | | Sams Teach Yourself SAP in 24 Hours (4th Edition)
When I was asked to update Sams Teach Yourself SAP in 24 Hours, I was completely
thrilled. Seriously! The world of SAP and our world in general have gone through major
upheavals in the last few years, and I was excited to share with SAPlings and veterans
alike just how much had changed. In the same way, I was anxious to realign and... | | PIC Microcontroller Project Book
I know you are interested in programming and using PIC microcontrollers. If
not, you would not have picked up this book and be reading this preface. The
first question one usually asks when choosing one book over another is,
"Which book offers me something more?" Since everyone is looking for some
thing a little different in... |
|
|
|
Data Mining and Machine Learning in Cybersecurity
In the emerging era of Web 3.0, securing cyberspace has gradually evolved into a
critical organizational and national research agenda inviting interest from a multidisciplinary
scientific workforce. There are many avenues into this area, and, in recent
research, machine-learning and data-mining techniques have been applied to design,... | | Drinking Water and Infectious Disease: Establishing the Links
There still exists considerable uncertainty in many countries about the contribution of drinking water to sporadic cases of disease. The Organization for Economic Cooperation and Development (OECD), in cooperation with the World Health Organization (WHO), led the Workshop on Molecular Technologies for Safe Drinking Water in 1998 to address... | | Handbook of FPGA Design Security
The purpose of this book is to provide a practical approach to managing security in
FPGA designs for researchers and practitioners in the electronic design automation
(EDA) and FPGA communities, including corporations, industrial and government
research labs, and academics. This book combines theoretical underpinnings with
a practical... |
|
Result Page: 140 139 138 137 136 135 134 133 132 131 |