Home | Amazing | Today | Tags | Publishers | Years | Search 
Encyclopedia of 20Th-Century Technology
Encyclopedia of 20Th-Century Technology

All editors of encyclopedias are faced with the problem of what to include. Even if the title is agreed and the numbers of volumes and pages have been decided, the sum of possible entries could be very large. In the case of the Encyclopedia of 20th-Century Technology, the editor decided that in order to construct a logical and consistent set...

Graphics Gems Iv/Book and Mac Version Disk (The Graphics Gems Series) (No.4)
Graphics Gems Iv/Book and Mac Version Disk (The Graphics Gems Series) (No.4)

We make images to communicate. The ultimate measure of the quality of our images is how well they communicate information and ideas from the creator’s mind to the perceiver’s mind. The efficiency of this communication, and the quality of our image, depends on both what we want to say and to whom we intend to say it. I believe that...

Hadoop in Action
Hadoop in Action

Hadoop in Action teaches readers how to use Hadoop and write MapReduce programs. The intended readers are programmers, architects, and project managers who have to process large amounts of data offline. Hadoop in Action will lead the reader from obtaining a copy of Hadoop to setting it up in a cluster and writing data...

Compared to What?: An Introduction to the Anaylsis of Algorithms
Compared to What?: An Introduction to the Anaylsis of Algorithms

I am very pleased to have this new book in the Aho/Ullman series Principles of Computer Science. I see this book as a major step toward making computer science theory accessible to the wide range of students who need to know the subject. It covers a good segment of the classical material on data structures and algorithms, but it does so in a...

Computability and Complexity Theory (Texts in Computer Science)
Computability and Complexity Theory (Texts in Computer Science)

The theory of computing provides computer science with concepts, models, and formalisms for reasoning about both the resources needed to carry out computations and the efficiency of the computations that use these resources. It provides tools to measure the difficulty of combinatorial problems both absolutely and in comparison with other...

Microsoft SharePoint 2010 PerformancePoint Services Unleashed
Microsoft SharePoint 2010 PerformancePoint Services Unleashed

This is a comprehensive, expert guide to all facets of planning, deploying, managing, and utilizing the brand-new SharePoint 2010 PerformancePoint Services. Authored by business and technical experts and a key member of the Microsoft PerformancePoint Services development team, this book demonstrates exactly how to apply...

Cool Thermodynamics: Engineering and Physics of Predictive, Diagnostic and Optimization Methods for Cooling Systems
Cool Thermodynamics: Engineering and Physics of Predictive, Diagnostic and Optimization Methods for Cooling Systems

This book is geared toward those interested in the engineering and physics of airconditioning and refrigeration devices (chillers). Analytic thermodynamic models are developed for a wide variety of cooling systems and a broad range of operating conditions. These models are easily implemented in the field or laboratory. Although the authors...

Classical Circuit Theory
Classical Circuit Theory

This book begins with the basic principles of circuits, derives their analytic properties in both the time and frequency domains, and states and proves the two important theorems. It then develops an algorithmic method to design common and uncommon types of circuits, such as prototype filters, lumped delay lines, constant phase difference...

Ensemble Methods in Data Mining: Improving Accuracy Through Combining Predictions
Ensemble Methods in Data Mining: Improving Accuracy Through Combining Predictions

Ensemble methods have been called the most influential development in Data Mining and Machine Learning in the past decade. They combine multiple models into one usually more accurate than the best of its components. Ensembles can provide a critical boost to industrial challenges -- from investment timing to drug discovery, and fraud detection...

Syntax-Based Collocation Extraction (Text, Speech and Language Technology)
Syntax-Based Collocation Extraction (Text, Speech and Language Technology)

Syntax-Based Collocation Extraction is the first book to offer a comprehensive, up-to-date review of the theoretical and applied work on word collocations. Backed by solid theoretical results, the computational experiments described based on data in four languages provide support for the book’s basic argument for using syntax-driven...

Analyzing Social Media Networks with NodeXL: Insights from a Connected World
Analyzing Social Media Networks with NodeXL: Insights from a Connected World

Businesses, entrepreneurs, individuals, and government agencies alike are looking to social network analysis (SNA) tools for insight into trends, connections, and fluctuations in social media. Microsoft's NodeXL is a free, open-source SNA plug-in for use with Excel. It provides instant graphical representation of relationships of complex...

Metrics and Methods for Security Risk Management
Metrics and Methods for Security Risk Management

Metrics and Methods for Security Risk Management offers powerful analytic tools that have been absent from traditional security texts. This easy-to-read text provides a handy compendium of scientific principles that affect security threats, and establishes quantitative security metrics that facilitate the development of...

Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy