Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Unity AI Game Programming - Second Edition
Unity AI Game Programming - Second Edition

Leverage the power of Unity 5 to create fun and unbelievable AI entities in your games!

About This Book

  • Compose richer games by learning the essential concepts in artificial intelligence with exciting examples
  • Explore the brand new Unity 5 features that make implementing artificial...
Information, Interaction, and Agency
Information, Interaction, and Agency
Contemporary epistemological and cognitive studies, as well as recent trends in computer science and game theory have revealed an increasingly important and intimate relationship between Information, Interaction, and Agency. Agents perform actions based on the available information and in the presence of other interacting agents. From this...
Field-Based Coordination for Pervasive Multiagent Systems
Field-Based Coordination for Pervasive Multiagent Systems
More and more, software systems involve autonomous and distributed software components that have to execute and interact in open and dynamic environments, such as in pervasive, autonomous, and mobile applications. The requirements with respect to dynamics, openness, scalability, and decentralization call for new approaches to software design and...
Agent and Web Service Technologies in Virtual Enterprises (Premier Reference Source)
Agent and Web Service Technologies in Virtual Enterprises (Premier Reference Source)
Use of Internet technologies for the interest of individuals and organizations is becoming more contextrelated and the center of gravity is correctly placed to the utility and the value that all involved parties are getting from a business transaction, a business venture or a collaborative service.

Therefore, both aspects that are
...
Multi-Agent Systems for Traffic and Transportation Engineering (Premier Reference Source)
Multi-Agent Systems for Traffic and Transportation Engineering (Premier Reference Source)
Our increasing societal demand for mobility now challenges researchers to devise more efficient traffic and transportation systems.

The Handbook of Research on Multi-Agent Systems for Traffic and Transportation Engineering provides a unique compendium of research covering topics such as transportation system designs, control...

Apple Device Management: A Unified Theory of Managing Macs, iPads, iPhones, and AppleTVs
Apple Device Management: A Unified Theory of Managing Macs, iPads, iPhones, and AppleTVs

Working effectively with Apple platforms at a corporate or business level includes not only infrastructure, but a mode of thinking that administrators have to adopt to find success. A mode of thinking that forces you to leave 30 years of IT dogma at the door. This book is a guide through how to integrate Apple products in your...

Mastering Windows Network Forensics and Investigation
Mastering Windows Network Forensics and Investigation

Conduct Cutting-Edge Forensic Investigations of Computer Crimes.

Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.

Now you can get the training you need in this...

Protein Misfolding in Neurodegenerative Diseases: Mechanisms and Therapeutic Strategies (Enzyme Inhibitors Series)
Protein Misfolding in Neurodegenerative Diseases: Mechanisms and Therapeutic Strategies (Enzyme Inhibitors Series)

Research focused on protein folding, misfolding, and aggregation is leading to major advances across biochemistry and medicine. The elucidation of a folding code is proving to be of extreme importance in the postgenomic era, where a number of orphan genes have been identified for which no clear function has yet been established. This research...

Penetration Testing and Network Defense (Cisco Press Networking Technology)
Penetration Testing and Network Defense (Cisco Press Networking Technology)

The practical guide to assessing network vulnerabilities andmanaging security risk.

  • Assess your network's defensive strengths and eliminatevulnerabilities with proven internal testing methodologies

  • Learn how to perform simulated attacks...

Parallel and Distributed Programming Using C++
Parallel and Distributed Programming Using C++

Parallel and Distributed Programming Using C++ provides an up-close look at how to build software that can take advantage of multiprocessor computers. Simple approaches for programming parallel virtual machines are presented, and the basics of cluster application development are...

Agent Communication II: International Workshops on Agent Communication, AC 2005 and AC 2006, Utrecht, Netherlands, July 25, 2005, and Hakodate, Japan
Agent Communication II: International Workshops on Agent Communication, AC 2005 and AC 2006, Utrecht, Netherlands, July 25, 2005, and Hakodate, Japan
This book constitutes the thoroughly refereed post-proceedings of the two International Workshops on Agent Communication, AC 2005 and AC 2006, held in Utrecht, Netherlands in July 2005, and in Hakodate, Japan in May 2006 as associated events of AAMAS 2005/2006, the main international conference on autonomous agents and multi-agent systems.

The...

Multi-Agent Programming : Languages, Platforms and Applications
Multi-Agent Programming : Languages, Platforms and Applications
Agent technology, in particular multi-agent systems, is beginning to play
an important role in today's software development at industrial level. Until
recently, the main focus of the multi-agent systems community has been
on the development of concepts, architectures, interaction techniques, and
general approaches to the
...
unlimited object storage image
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy