Home | Amazing | Today | Tags | Publishers | Years | Search 
Computational Intelligence: Engineering of Hybrid Systems
Computational Intelligence: Engineering of Hybrid Systems

Hybrid Intelligent Systems has become an important research topic in computer science and a key application field in science and engineering. This book offers a gentle introduction to the engineering aspects of hybrid intelligent systems, also emphasizing the interrelation with the main intelligent technologies such as genetic algorithms –...

Microsoft .NET for Visual FoxPro Developers
Microsoft .NET for Visual FoxPro Developers
I asked myself this question when early releases of .NET first arrived on the scene. Visual FoxPro allowed me to do pretty much anything I wanted, from building single-tier applications with a VFP back end, all the way to building distributed Internet applications accessing clientserver data.

Then, I started to dive into the .NET
...
Fundamentals of Statistics with Fuzzy Data
Fundamentals of Statistics with Fuzzy Data
This research monograph presents basic foundational aspects for a theory of statistics with fuzzy data, together with a set of practical applications. Fuzzy data are modeled as observations from random fuzzy sets. Theories of fuzzy logic and of random closed sets are used as basic ingredients in building statistical concepts and procedures in the...
Visual Studio 2005 All-In-One Desk Reference For Dummies (Computer/Tech)
Visual Studio 2005 All-In-One Desk Reference For Dummies (Computer/Tech)
If you're like me, you were probably a little perplexed by the announcement of the new Visual Studio and .NET platforms. My immediate reaction was, "Oh, no-not another set of tools to learn." Don't get me wrong. I embraced Visual Studio .NET and, like most of you, I looked forward to the stability of Visual Studio 2003 and version 1.1 of...
Java Security Solutions
Java Security Solutions
Your complete guide to the what, why, where, and how of Java Security

In this unique guide, two Java security experts show you how to take full advantage of Java security technologies–cryptography, algorithms, and architecture. They explain today’s Java security tools, concepts, protocols, and specifications, including ECC, RSA,...

Fuzzy Mathematical Programming and Fuzzy Matrix Games
Fuzzy Mathematical Programming and Fuzzy Matrix Games
From the reviews of the first edition:

"The book presents a systematic theory … oriented primarily to senior undergraduate students, as well as to graduate students and researchers in the area of fuzzy optimization and related topics. Special attention is devoted to various approaches to fuzzy linear and quadratic programming...

VBA for the 2007 Microsoft(R) Office System (Business Solutions)
VBA for the 2007 Microsoft(R) Office System (Business Solutions)
“VBA for the 2007 Microsoft Office System is jam-packed with code samples that you’ll be able to reuse right away in your VBA projects.”

—Guy Barrette, Microsoft MVP & Regional Director, .NET Expertise

 

...
Concepts of Programming Languages (7th Edition)
Concepts of Programming Languages (7th Edition)
Concepts of Programming Languages describes the fundamental concepts of programming languages by presenting design issues, examining design choices, and critically comparing design alternatives without being language specific. This book is appropriate for anyone who wants to compare and contrast various programming languages.

...
Game Programming Gems 6 (Book & CD-ROM)
Game Programming Gems 6 (Book & CD-ROM)
Welcome to the sixth volume of the Game Programming Gems series. With team sizes constantly expanding, developers are finding themselves pushed to become increasingly specialized. This makes it important to have cutting-edge, ready-to-use material in your specialization, as well as resources that you can call upon if you need to work outside your...
Pro SQL Server 2005 Replication (Definitive Guide)
Pro SQL Server 2005 Replication (Definitive Guide)
Replication is a way of copying and updating information in a database. This allows all users to see the same information and any changes made to it. Replication also duplicates the database across a number of computers so that, if one computer goes down, the information is not lost and can still be accessed. Pro SQL Server 2005...
Computer Viruses: from theory to applications (Collection IRIS)
Computer Viruses: from theory to applications (Collection IRIS)
This book deals with computer viruses envisaged from three different points of view, namely the theoretical fundamentals of computer virology, algorithmic and practical aspects of viruses and their potential applications to various areas. The theoretical formalization by means of Turing machines, self-reproducing automata and recursive functions...
Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks
Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks
The rapid progress of mobile/wireless communication and embedded microsensing MEMS technologies leads us toward the dream “Ubiquitous/Pervasive Computing.” Wireless local-area networks (WLANs) have been widely deployed in many cities and have become a requisite tool to many people in their daily lives. Wireless personal-area networks...
Result Page: 239 238 237 236 235 234 233 232 231 230 229 228 227 226 225 224 223 222 221 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy