Home | Amazing | Today | Tags | Publishers | Years | Search 
Evolving Connectionist Systems: The Knowledge Engineering Approach (Evolving Connectionist Systems)
Evolving Connectionist Systems: The Knowledge Engineering Approach (Evolving Connectionist Systems)
This second edition of Evolving Connectionist Systems presents generic computational models and techniques that can be used for the development of evolving, adaptive modelling systems, as well as new trends including computational neuro-genetic modelling and quantum information processing related to evolving systems. New applications, such as...
Programming WPF
Programming WPF

If you want to build applications that take full advantage of Windows Vista's new user interface capabilities, you need to learn Microsoft's Windows Presentation Foundation (WPF). This new edition, fully updated for the official release of .NET 3.0, is designed to get you up to speed on this technology quickly. By page 2, you'll...

Peer-to-Peer Computing: Building Supercomputers with Web Technologies (Computer Communications and Networks)
Peer-to-Peer Computing: Building Supercomputers with Web Technologies (Computer Communications and Networks)
Client/Server architecture was first proposed in the late 1980s as an alternative to conventional mainframe systems. Mainframe processing quickly becomes a bottleneck in any information system, but client/server models shift the processing burden to the client computer. Through workload sharing, client/server systems can improve overall efficiency...
Oracle Application Server 10g Web Development (Oracle Press)
Oracle Application Server 10g Web Development (Oracle Press)

Create Integrated, High-Performance Internet Applications

Develop flexible, cross-platform Web applications using Oracle Application Server 10g and this exclusive Oracle Press guide. Take advantage of the full support for all major Web development languages, APIs, and frameworks and learn to create and test...

The Iterated Prisoners' Dilemma: 20 Years on (Advances in Natural Computation)
The Iterated Prisoners' Dilemma: 20 Years on (Advances in Natural Computation)
In 1984, Robert Axelrod reported the results of two iterated prisoner's dilemma (IPD) competitions [Axelrod (1984)]. The booked was to be a catalyst for much of the research in this area since that time. It is unlikely that you would write a scientific paper about IPD, without citing Axelrod's 1984 book. The book is even more remarkable in that it...
Integrated Research in GRID Computing: CoreGRID Integration Workshop 2005 (Selected Papers) November 28-30, Pisa, Italy
Integrated Research in GRID Computing: CoreGRID Integration Workshop 2005 (Selected Papers) November 28-30, Pisa, Italy
Integrated Research in Grid Computing presents a selection of the best papers presented at the CoreGRID Integration Workshop (CGIW2005), which took place on November 28-30, 2005 in Pisa, Italy.

The aim of CoreGRID is to strengthen and advance scientific and technological excellence in the area of Grid and Peer-to-Peer technologies in...

Arabic Computational Morphology: Knowledge-based and Empirical Methods (Text, Speech and Language Technology)
Arabic Computational Morphology: Knowledge-based and Empirical Methods (Text, Speech and Language Technology)
The morphology of Arabic poses special challenges to computational natural language processing systems. The exceptional degree of ambiguity in the writing system, the rich morphology, and the highly complex word formation process of roots and patterns all contribute to making computational approaches to Arabic very challenging. Indeed many...
ARIS Design Platform: Getting Started with BPM
ARIS Design Platform: Getting Started with BPM
This practical "how-to" guide to both using the ARIS Design Platform and, more importantly, how to use it to create real business models, follows Rob Davis’ hugely successful, Business Process Modelling with ARIS (Springer 2001). This second volume describes the ARIS Business Architect and ARIS Business Designer web clients...
Building Software: A Practitioner's Guide (Auerbach Series on Applied Software Engineering)
Building Software: A Practitioner's Guide (Auerbach Series on Applied Software Engineering)
Novel in its approach to software design, development, and management, Building Software: A Practitioner's Guide shows you how to successfully build and manage a system. The approach the authors recommend is a simple, effective framework known as Solution Engineering Execution (SEE). Through SEE, you create a successful solution by following a...
IS-IS: Deployment in IP Networks
IS-IS: Deployment in IP Networks

IS-IS, the Intermediate System to Intermediate System protocol, has been used effectively as a routing protocol for many large-scale networks, including service provider backbone, telephone system management, and power equipment networks. Used in conjunction with the Border Gateway Protocol...

MCSA/MCSE Self-Paced Training Kit (Exam 70-290): Managing and Maintaining a Microsoft Windows Server 2003 Environment, Second Edition
MCSA/MCSE Self-Paced Training Kit (Exam 70-290): Managing and Maintaining a Microsoft Windows Server 2003 Environment, Second Edition
Announcing an all-new MCSA/MCSE Training Kit designed to help maximize your performance on Exam 70-290, a core exam for the new Windows Server 2003 certification. This kit packs the tools and features that exam candidates want mostincluding in-depth, self-paced training based on final exam content; rigorous, objective-by-objective review; exam tips...
Visual Basic(r) 6.0 Internet Programming
Visual Basic(r) 6.0 Internet Programming
Expert guidance, programming tips, and plenty of real code examples.

Visual Basic programmers, here's your chance to quickly master the knowledge and skills you need to give your Windows and NT applications sophisticated Internet utilities, components, and applets. With the help of a series of progressively complex programming...

Result Page: 1766 1765 1764 1763 1762 1761 1760 1759 1758 1757 1756 1755 1754 1753 1752 1751 1750 1749 1748 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy