Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Theoretical Introduction to Programming
Theoretical Introduction to Programming
Including easily digested information about fundamental techniques and concepts in software construction, this book is distinct in unifying pure theory with pragmatic details. Driven by generic problems and concepts, with brief and complete illustrations from languages including C, Prolog, Java, Scheme, Haskell and HTML. This book is intended to...
Software Agreements Line by Line: How to Understand & Change Software Licenses & Contracts to Fit Your Needs
Software Agreements Line by Line: How to Understand & Change Software Licenses & Contracts to Fit Your Needs
In such a business climate that demands a heightened understanding and keen ability to leverage essential technologies, one must understand every element of an agreement as critical and essential as the software user/vendor contract. As there has long been a disconnect between the express interests of the end user and the objectives of the vendor...
Fuzzy Quantifiers: A Computational Theory (Studies in Fuzziness and Soft Computing)
Fuzzy Quantifiers: A Computational Theory (Studies in Fuzziness and Soft Computing)
From a linguistic perspective, it is quantification which makes all the difference between “having no dollars” and “having a lot of dollars”. And it is the meaning of the quantifier “most” which eventually decides if “Most Americans voted Kerry” or “Most Americans voted Bush” (as it...
Algorithms, Data Structures, and Problem Solving With C++
Algorithms, Data Structures, and Problem Solving With C++
This book was designed for a second course in computer science, which has typically been known as CS-2 Data Structures. The content of CS-2 has been evolving over some time, but there is general agreement that topics such as structures, pointers, and data structures should be taught, along with an introduction to algorithm analysis and a general...
A Dictionary of Real Numbers
A Dictionary of Real Numbers
How do we recognize that the number .93371663... is actually 21og1 0(e + 7r)/2 ? Gauss observed that the number 1.85407467... is (essentially) a rational value of an elliptic integral—an observation that was critical in the development of nineteenth century analysis. How do we decide that such a number is actually a special value of a...
Effective Negotiation: From Research to Results
Effective Negotiation: From Research to Results

Essential reading for students and professionals in the fields of business, law and management, Effective Negotiation offers a realistic and practical understanding of negotiation and the skills required in order to reach an agreement. In this book Ray Fells draws on his extensive experience as a teacher and researcher to examine key issues...

Service Level Management Best Practice Handbook: Building, Running and Managing Effective Service Level Management SLAs - Ready to Use Supporting Documents Bringing ITIL Theory into Practice
Service Level Management Best Practice Handbook: Building, Running and Managing Effective Service Level Management SLAs - Ready to Use Supporting Documents Bringing ITIL Theory into Practice
Many organizations are looking to implement Service Level Management as a way to improve the structure and quality of the business.

This document describes the contents of the Service Level Management Guide. The information found within the book is based on the ITIL Version 2 framework, specifically the Service
...
Outsourcing Management Information Systems
Outsourcing Management Information Systems
Outsourcing is defined as being one of allocating or reallocating business activities from an internal source to an external source (Schniederjans, Schniederjans, & Schniederjans, 2005, p. 3). Any business activity can be outsourced. All or part of any of the unique business activities in a functional area, like management information systems,...
The Cold War (Questions and Analysis in History)
The Cold War (Questions and Analysis in History)
Designed to aid undergraduate and advanced study, this invaluable reference work provides an up-to-date summary of the latest research on the origins, escalation, and end of the Cold War. The major phases of the war are clearly organized and presented in eight chapters--each consisting of a factual overview of events, a detailed analysis of key...
Hands-On Meta Learning with Python: Meta learning using one-shot learning, MAML, Reptile, and Meta-SGD with TensorFlow
Hands-On Meta Learning with Python: Meta learning using one-shot learning, MAML, Reptile, and Meta-SGD with TensorFlow

Explore a diverse set of meta-learning algorithms and techniques to enable human-like cognition for your machine learning models using various Python frameworks

Key Features

  • Understand the foundations of meta learning algorithms
  • Explore practical examples to explore...
Domain Names: How to Choose and Protect a Great Name for Your Website (Quick & Legal)
Domain Names: How to Choose and Protect a Great Name for Your Website (Quick & Legal)
With clever (and even not-so-clever) names for websites disappearing faster than you can say "Internet Start-Up," e-entrepreneurs need to know that their choice won't be whisked out from under their ISPs.

This book explains in plain English how to choose, register and protect a domain name that works. Written both for those...

Ontology and the Semantic Web:  Volume 156 Frontiers in Artificial Intelligence and Applications
Ontology and the Semantic Web: Volume 156 Frontiers in Artificial Intelligence and Applications
In order for information systems supporting two different organizations to interoperate, there must be an agreement as to what the words mean. There are many such agreements in place, supporting information systems interoperation in many different application areas. Most of these agreements have been created as part of diverse systems development...
unlimited object storage image
Result Page: 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy