Home | Amazing | Today | Tags | Publishers | Years | Search 
LR Parsing: Theory and Practice (Cambridge Studies in Cultural Systems)
LR Parsing: Theory and Practice (Cambridge Studies in Cultural Systems)

LR parsing has become a widely used method of syntax analysis; this is largely due to the availability of parser generators and compiler- compilers based on LR techniques. However, the readily available ac counts of the theory of these techniques are either superficial or are weighed down with tedious mathematical detail of a merely...

Digital Asset Management
Digital Asset Management

My interest in this subject started when I joined the broadcast equipment manufacturer, Chyron. For a few years I was the product manager for their playout automation and asset management product lines. These were one of the first applications that gave television broadcasters the means to manage the ingest, storage, archiving, and...

Handbook of Data Intensive Computing
Handbook of Data Intensive Computing
This handbook is carefully edited book – contributors are worldwide experts in the field of data intensive computing and their applications. The scope of the book includes leading edge data intensive computing architectures and systems, innovative storage, virtualization, and parallel processing technologies applied in...
Boosting-Based Face Detection and Adaptation (Synthesis Lectures on Computer Vision)
Boosting-Based Face Detection and Adaptation (Synthesis Lectures on Computer Vision)
With the rapid increase of computational powers and availability of modern sensing, analysis and rendering equipment and technologies, computers are becoming more and more intelligent. Many research projects and commercial products have demonstrated the capability for a computer to interact with human in a natural way by looking at...
Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-to-peer (P2P) has proven as a most successful way to produce large scale, reliable, and cost-effective applications, as illustrated for file sharing or VoIP. P2P storage is an emerging field of application which allows peers to collectively leverage their resources towards ensuring the reliability and availability of user...
Machine Learning for Hackers
Machine Learning for Hackers

To explain the perspective from which this book was written, it will be helpful to define the terms machine learning and hackers.

What is machine learning? At the highest level of abstraction, we can think of machine learning as a set of tools and methods that attempt to infer patterns and extract insight from a record of the...

Personalization Techniques And Recommender Systems
Personalization Techniques And Recommender Systems

The phenomenal growth of the Internet has resulted in the availability of huge amounts of online information, a situation that is overwhelming to the end-user. To overcome this problem personalization technologies have been extensively employed across several domains to provide assistance in filtering, sorting, classifying and sharing...

Securing the Cloud: Cloud Computer Security Techniques and Tactics
Securing the Cloud: Cloud Computer Security Techniques and Tactics

This book will prove to be a practical resource for anyone who is considering using, building, or securing a cloud implementation. Security professionals may refer to this book as a source of detailed information for evaluating and verifying cloud security policy and requirements. Cloud infrastructure engineers, cloud services...

Geospatial Semantics and the Semantic Web: Foundations, Algorithms, and Applications (Semantic Web and Beyond)
Geospatial Semantics and the Semantic Web: Foundations, Algorithms, and Applications (Semantic Web and Beyond)

The availability of geographic and geo-spatial information and services, especially on the openWeb, has become abundant in the last several yearswith the proliferation of online maps, geo-coding services, geospatial Web services and geospatially enabled applications. Concurrently, the need for geo-spatial reasoning has significantly...

Theoretical Computer Sciences: Lectures given at a Summer School of the Centro Internazionale Matematico Estivo
Theoretical Computer Sciences: Lectures given at a Summer School of the Centro Internazionale Matematico Estivo

R.E. Miller: Parallel program schemata.- D.E. Muller: Theory of automata.- R. Karp: Computational complexity of combinatorial and graph-theoretic problems.

In this lecture we discuss a type of computer organization which is based upon the concept of operation sequencing being controlled by operand availability. Such sequencing...

JUNOS Security
JUNOS Security

Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations...

Linking Government Data
Linking Government Data

The Linked Open Data Project started just four years ago in 2007. In that short time Linked Data has grown into an almost mainstream activity for many governments around the world. As of this writing, the US Government’s open data site listed twenty one countries whose governments publish open data regarding the operations of...

Result Page: 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy