Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Serial Killer Investigations
Serial Killer Investigations

In 1977, FBI Special Agent Robert Ressler first used the term ‘serial killer’ after a visit to Bramshill Police Academy, near London, where someone referred to a ‘serial burglar’. The inspired coinage was soon in general use to describe killers such as necrophile Ed Kemper (ten victims), schizophrenic Herb Mullin (14),...

Application of Intelligent Systems in Multi-modal Information Analytics: Proceedings of the 2020 International Conference on Multi-model Information ... in Intelligent Systems and Computing, 1234)
Application of Intelligent Systems in Multi-modal Information Analytics: Proceedings of the 2020 International Conference on Multi-model Information ... in Intelligent Systems and Computing, 1234)

This book presents the proceedings of the 2020 International Conference on Intelligent Systems Applications in Multi-modal Information Analytics, held in Changzhou, China, on June 18–19, 2020. It provides comprehensive coverage of the latest advances and trends in information technology, science and engineering. It addresses a...

Applications of Soft Computing: From Theory to Praxis (Advances in Intelligent and Soft Computing)
Applications of Soft Computing: From Theory to Praxis (Advances in Intelligent and Soft Computing)

The World Soft Computing (WSC) conference is an annual international online conference on applied and theoretical soft computing technology. This WSC 2008 is the thirteenth conference in this series and it has been a great success.

We received a lot of excellent paper submissions which were peer-reviewed by an international...

Ubiquitous Multimedia and Mobile Agents: Models and Implementations
Ubiquitous Multimedia and Mobile Agents: Models and Implementations

Ubiquitous multimedia systems, or mobile multimedia systems, offer the promise of pervasive delivery of multimedia content to mobile users and their handheld devices.

Ubiquitous Multimedia and Mobile Agents: Models and Implementations provides the hybridization of two paradigms, namely, ubiquitous/mobile multimedia and mobile...

Securing Your Business with Cisco ASA and PIX Firewalls
Securing Your Business with Cisco ASA and PIX Firewalls
The easy-to-use guide for learning how to secure networks with the world-class PIX Firewall Ideal for network administrators with little or no firewall experience Easily explains how to implement a security system in small and medium businesses or at home using graphical PIX Device Manager (PDM) Presents best practices for locking down network...
Emerging Web Services Technology (Whitestein Series in Software Agent Technologies and Autonomic Computing)
Emerging Web Services Technology (Whitestein Series in Software Agent Technologies and Autonomic Computing)
This book contains initial results of innovative and sometimes controversial emerging Web services research ideas. It covers a wide spectrum of active research areas like Model Driven Engineering for SOA, Mobility and Services, Dynamic Web Service Discovery and Composition, Service Management, and Semantic Web, just to name a few.

As Web...

Social Simulation: Technologies, Advances and New Discoveries (Premier Reference)
Social Simulation: Technologies, Advances and New Discoveries (Premier Reference)
The simulation of social behavior in a variety of domains is an increasingly important technological tool.

eference survey of social simulation work, Social Simulation: Technologies, Advances and New Discoveries comprehensively collects the most exciting developments in the field. Drawing research contributions from a vibrant...

Autonomous Intelligent Systems: Multi-Agents and Data Mining: Second International Workshop, AIS-ADM 2007, St. Petersburg, Russia, June 3-5, 2007
Autonomous Intelligent Systems: Multi-Agents and Data Mining: Second International Workshop, AIS-ADM 2007, St. Petersburg, Russia, June 3-5, 2007
This book constitutes the refereed proceedings of the Second International Workshop on Autonomous Intelligent Systems: Agents and Data Mining, AIS-ADM 2007, held in St. Petersburg, Russia in June 2007.

The 17 revised full papers and 6 revised short papers presented together with 4 invited lectures were carefully reviewed and selected from 39...

Robert Ludlum's The Bourne Legacy
Robert Ludlum's The Bourne Legacy

In Robert Ludlum's ground-breaking career, no other character so captured and held the world's imagination as Jason Bourne. He appeared in three of Robert Ludlum's own #1 bestselling novels - The Bourne Identity, The Bourne Supremacy, and The Bourne Ultimatum - and they remain amongst Ludlum's most-read...

Imaging of Parasitic Diseases
Imaging of Parasitic Diseases

With parasitic diseases increasing worldwide it’s vitally important that radiologists in particular stay up to date with developments. In this brilliantly useful volume, the authors cover the imaging findings for parasitic diseases that can affect the human body using modern imaging equipments. Every chapter consists of a short...

IT Inventory and Resource Management with OCS Inventory NG 1.02
IT Inventory and Resource Management with OCS Inventory NG 1.02

OCS Inventory NG is a cross-platform, open-source inventory and asset management solution. It brings more than plentiful features to the table to satisfy the business needs of small-to-large organizations with up to tens of thousands of computers. However, to put this inventory solution to optimum use requires a lot of skill.

This...

Cooperative Control of Distributed Multi-Agent Systems
Cooperative Control of Distributed Multi-Agent Systems

The paradigm of ‘multi-agent’ cooperative control is the challenge frontier for new control system application domains, and as a research area it has experienced a considerable increase in activity in recent years. This volume, the result of a UCLA collaborative project with Caltech, Cornell and MIT, presents cutting edge results in...

unlimited object storage image
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy