Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Foundations and Novel Approaches in Data Mining (Studies in Computational Intelligence)
Foundations and Novel Approaches in Data Mining (Studies in Computational Intelligence)
Data-mining has become a popular research topic in recent years for the treatment of the "data rich and information poor" syndrome. Currently, application oriented engineers are only concerned with their immediate problems, which results in an ad hoc method of problem solving. Researchers, on the other hand, lack an understanding of the...
Metonymy: Hidden Shortcuts in Language, Thought and Communication (Cambridge Studies in Cognitive Linguistics)
Metonymy: Hidden Shortcuts in Language, Thought and Communication (Cambridge Studies in Cognitive Linguistics)

'Metonymy' is a type of figurative language used in everyday conversation, a form of shorthand that allows us to use our shared knowledge to communicate with fewer words than we would otherwise need. 'I'll pencil you in' and 'let me give you a hand' are both examples of metonymic language. Metonymy serves a wide...

Designing Interfaces
Designing Interfaces

Designing a good interface isn't easy. Users demand software that is well-behaved, good-looking, and easy to use. Your clients or managers demand originality and a short time to market. Your UI technology -- web applications, desktop software, even mobile devices -- may give you the tools you need, but little guidance on how to use them...

Markov Random Fields for Vision and Image Processing (MIT Press)
Markov Random Fields for Vision and Image Processing (MIT Press)

This volume demonstrates the power of the Markov random field (MRF) in vision, treating the MRF both as a tool for modeling image data and, utilizing recently developed algorithms, as a means of making inferences about images. These inferences concern underlying image and scene structure as well as solutions to such problems as image...

Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...
Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...

Multiplexed networks are essential for the unified, efficient and cost-effective exchange of electronic information within embedded component systems. This is especially important in automotive manufacturing as vehicles become increasingly reliant on robust electronic networks and systems for improved reliability, anti-lock brake systems (ABS),...

Handbook of Data Structures and Applications
Handbook of Data Structures and Applications

Handbook of Data Structures and Applications responds to the needs of data structure and algorithm researchers by providing a comprehensive survey of data structures of various types. Divided into seven parts, the text begins with a review of introductory material, followed by a discussion of well-know classes of data structures, Priority...

Artificial Intelligence and Literary Creativity: Inside the Mind of Brutus, A Storytelling Machine
Artificial Intelligence and Literary Creativity: Inside the Mind of Brutus, A Storytelling Machine

Now that IBM's Deep Blue computer beat the world's greatest human chess player, Gary Kasparov, this book will see if a story can be written better by a human or a machine.

This book marks the marriage of logic and creativity.

While it may be true that incompatible humans often wed, there are doubtless unions of a less palpable...

Semantic Web Services: Theory, Tools and Applications
Semantic Web Services: Theory, Tools and Applications
Semantic Web is here to stay! This is not really a marketing campaign logo, but it is a truth that every year is becoming more and more relevant to the daily life of business world, industry and society. I do not know how it happened, but the last years, through our activities in the Special Interest Group on Semantic Web and Information Systems in...
Malicious Cryptography: Exposing Cryptovirology
Malicious Cryptography: Exposing Cryptovirology
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first...
The Computer Engineering Handbook (Electrical Engineering Handbook)
The Computer Engineering Handbook (Electrical Engineering Handbook)

There is arguably no field in greater need of a comprehensive handbook than computer engineering. Under the leadership of Vojin Oklobdzija and a stellar editorial board, some of the industry's foremost experts have joined forces to create what promises to be the definitive resource for computer design and engineering. Instead of focusing on...

Principles of Bacterial Detection: Biosensors, Recognition Receptors and Microsystems
Principles of Bacterial Detection: Biosensors, Recognition Receptors and Microsystems
Bacterial contamination of food and water resources, as well as the increasing incidence of nosocomial infections, has us on our toes, looking for ways of recognizing these elements. In addition, the recent and growing threats to personal and territorial securities make this task even  more urgent. Therefore, accurate assessment of the state...
Geographic Information Systems in Business
Geographic Information Systems in Business
This book contains state-of-the-art research studies on the concepts, theory, processes, and real world applications of geographical information systems (GIS) in business. Its chapters are authored by many of the leading experts in applying GIS and geospatial science to business. The book utilizes a wide variety of approaches and methodologies...
unlimited object storage image
Result Page: 266 265 264 263 262 261 260 259 258 257 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy