Home | Amazing | Today | Tags | Publishers | Years | Search 
Mathematical Models of Spoken Language
Mathematical Models of Spoken Language
Humans use language to convey meaningful messages to each other. Linguistic competence consists in the ability to express meaning reliably, not simply to obtain faithful lexical transcriptions. This invaluable reference tool is the product of many years' experience and research on language and speech technology. It presents the motivations for,...
Neural Network Modeling: Statistical Mechanics and Cybernetic Perspectives
Neural Network Modeling: Statistical Mechanics and Cybernetic Perspectives
Neural Network Modeling offers a cohesive approach to the statistical mechanics and principles of cybernetics as a basis for neural network modeling. It brings together neurobiologists and the engineers who design intelligent automata to understand the physics of collective behavior pertinent to neural elements and the self-control aspects of...
The SPIN Model Checker: Primer and Reference Manual
The SPIN Model Checker: Primer and Reference Manual
SPIN is the world's most popular, and arguably one of the world's most powerful, tools for detecting software defects
in concurrent system designs. Literally thousands of people have used SPIN since it was first introduced almost fifteen
years ago. The tool has been applied to everything from the verification of complex call processing
...
C++ for Mathematicians: An Introduction for Students and Professionals
C++ for Mathematicians: An Introduction for Students and Professionals

The first book available on C++ programming that is written specifically for a mathematical audience, C++ for Mathematicians omits the language's more obscure features in favor of the aspects of greatest utility for mathematical work. Emphasizing the essential role of practice as part of the learning process, the book is ideally designed...

Computer Viruses: from theory to applications (Collection IRIS)
Computer Viruses: from theory to applications (Collection IRIS)
This book deals with computer viruses envisaged from three different points of view, namely the theoretical fundamentals of computer virology, algorithmic and practical aspects of viruses and their potential applications to various areas. The theoretical formalization by means of Turing machines, self-reproducing automata and recursive functions...
Multi-Robot Systems. From Swarms to Intelligent Automata, Volume III: Proceedings from the 2005 International Workshop on Multi-Robot Systems
Multi-Robot Systems. From Swarms to Intelligent Automata, Volume III: Proceedings from the 2005 International Workshop on Multi-Robot Systems
This proceedings volume documents recent cutting-edge developments in multi-robot systems research. This volume is the result of the Third International workshop on Multi-Robot Systems that was held in March 2005 at the Naval Research Laboratory in Washington, D.C. This workshop brought together top researchers working in areas relevant to...
Knowledge-Based Neurocomputing
Knowledge-Based Neurocomputing
Neurocomputing methods are loosely based on a model of the brain as a network of simple interconnected processing elements corresponding to neurons. These methods derive their power from the collective processing of artificial neurons, the chief advantage being that such systems can learn and adapt to a changing environment. In knowledge-based...
Dynamics of Complex Systems (Studies in Nonlinearity)
Dynamics of Complex Systems (Studies in Nonlinearity)
The study of complex systems in a unified framework has become recognized in recent years as a new scientific discipline, the ultimate in the interdisciplinary fields. Breaking down the barriers between physics, chemistry, and biology and the so-called soft sciences of psychology, sociology, economics and anthropology, this text explores the...
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities...
Myths About Doing Business in China
Myths About Doing Business in China
China has always been a land of myth, mystery and exaggeration for the West.

Marco Polo came back to thirteenth-century Venice with tales of cities of a million people (unheard of in those days), unimaginable wealth, exotic food and strange customs. Eighteenth-century adventurers bought tales of rulers enlightened by the wise words of
...
Introduction to Constraint Databases
Introduction to Constraint Databases
Constraint databases provide extra expressive power over relational databases in a largely hidden way at the data-storage or physical level. Constraints, such as linear or polynomial equations, are used to represent large sets in a compact manner. They keep the view of the database for a user or application programmer almost as simple as in...
System-on-Chip Test Architectures (Systems on Silicon)
System-on-Chip Test Architectures (Systems on Silicon)
Modern electronics testing has a legacy of more than 40 years. The introduction of new technologies, especially nanometer technologies with 90nm or smaller geometry, has allowed the semiconductor industry to keep pace with the increased performance-capacity demands from consumers. As a result, semiconductor test costs have been growing steadily...
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy