Home | Amazing | Today | Tags | Publishers | Years | Search 
Discrete Mathematics for Computer Scientists
Discrete Mathematics for Computer Scientists

Many colleges and universities offer a course in discrete mathematics. Students taking these courses are from many disciplines, one of the largest being computer science. As a part of the Mathematics Across the Curriculum project at Dartmouth, supported by the National Science Foundation,1 we proposed to create a discrete mathematics...

Artificial Intelligence: Structures and Strategies for Complex Problem Solving (6th Edition)
Artificial Intelligence: Structures and Strategies for Complex Problem Solving (6th Edition)

was very pleased to be asked to produce the sixth edition of my artificial intelligence book. It is a compliment to the earlier editions, started over twenty years ago, that our approach to AI has been so highly valued. It is also exciting that, as new development in the field emerges, we are able to present much of it in each new...

C++ for Everyone
C++ for Everyone

This book is an introduction to C++ and computer programming that focuses on the essentials—and on effective learning. The book is designed to serve a wide range of student interests and abilities and is suitable for a first course in programming for computer scientists, engineers, and students in other disciplines. No prior...

Digital Preservation for Heritages: Technologies and Applications
Digital Preservation for Heritages: Technologies and Applications

Cultural heritages include rich information related to social, historical and cultural values. Affected by climate, environmental and other factors, some valuable heritage information is threatened through destruction or disappearance, and some is still not utilized sufficiently. How to investigate and utilize such information...

Knowledge Processing and Data Analysis: First International Conference, KONT 2007, Novosibirsk, Russia
Knowledge Processing and Data Analysis: First International Conference, KONT 2007, Novosibirsk, Russia

This volume collects the proceedings of two related international conferences on foundations and practical applications of mathematical methods of data analysis, of Formal Concept Analysis and of methods for information extraction from natural language texts. The first conference, named Knowledge - Ontology - Theory 2007 (KONT 2007),...

The Image Processing Handbook, Sixth Edition
The Image Processing Handbook, Sixth Edition

Image processing is used in a wide variety of applications, for two somewhat different purposes:

1. improving the visual appearance of images to a human observer, including their printing and transmission, and

2. preparing images for the measurement of the features and structures which they reveal.

The...

Numerical Analysis Using MATLAB and Spreadsheets: Second Edition
Numerical Analysis Using MATLAB and Spreadsheets: Second Edition

Numerical analysis is the branch of mathematics that is used to find approximations to difficult problems such as finding the roots of non-linear equations, integration involving complex expressions and solving differential equations for which analytical solutions do not exist. It is applied to a wide variety of disciplines such as...

WS-BPEL 2.0 for SOA Composite Applications with IBM WebSphere 7
WS-BPEL 2.0 for SOA Composite Applications with IBM WebSphere 7

I am quite honored that the authors of this book asked me if I could write the foreword. They have a long and concrete experience in implementing business processes, and we have interacted together in the context of telecommunication operators, where they delivered successful business process implementation.

What I would like to...

Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition

There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter.

If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the...

Markov Models for Pattern Recognition: From Theory to Applications
Markov Models for Pattern Recognition: From Theory to Applications

The development of pattern recognition methods on the basis of so-called Markov models is tightly coupled to the technological progress in the field of automatic speech recognition. Today, however, Markov chain and hidden Markov models are also applied in many other fields where the task is the modeling and analysis of chronologically...

Google Power Search
Google Power Search

If you’re like me, you use Google every day to find things—news, technical support, events, tips, research documents, and more. Were you to master Google’s powerful search refinement operators and lesser-known features, over a year’s time you could save days scouring over irrelevant results.

...

Algebra DeMYSTiFieD, Second Edition
Algebra DeMYSTiFieD, Second Edition

Your SOLUTION to mastering ALGEBRA!

Trying to tackle algebra but nothing's adding up? No problem! Factor in Algebra Demystified, Second Edition and multiply your chances of learning this important branch of mathematics.

Written in a step-by-step format, this practical guide covers fractions, variables,...

Result Page: 164 163 162 161 160 159 158 157 156 155 154 153 152 151 150 149 148 147 146 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy