 |
|
 Pro Objective-C Design Patterns for iOS
It’s time to capitalize on your mastery of Cocoa with Pro Objective-C Design Patterns for iOS. You’ve developed apps that impressed and performed, and now you’re ready to jump into development practices that will leave you with more effective, efficient, and professional level apps. This book is the... |  |  Ranking Queries on Uncertain Data (Advances in Database Systems)
Uncertain data is inherent in many important applications, such as environmental surveillance, market analysis, and quantitative economics research. Due to the importance of those applications and rapidly increasing amounts of uncertain data collected and accumulated, analyzing large collections of uncertain data has become an important task.... |  |  Fundamentals of Predictive Text Mining (Texts in Computer Science)
Five years ago, we authored “Text Mining: Predictive Methods for Analyzing Unstructured Information.” That book was geared mostly to professional practitioners, but was adaptable to course work with some effort by the instructor. Many topics were evolving, and this was one of the earliest efforts to collect material for predictive... |
|
|
 Learn You a Haskell for Great Good!: A Beginner's Guide
It's all in the name: Learn You a Haskell for Great Good! is a hilarious, illustrated guide to this complex functional language. Packed with the author's original artwork, pop culture references, and most importantly, useful example code, this book teaches functional fundamentals in a way you never thought... |  |  Core Concepts in Data Analysis: Summarization, Correlation and Visualization
In this textbook, I take an unconventional approach to data analysis. Its contents
are heavily influenced by the idea that data analysis should help in enhancing and
augmenting knowledge of the domain as represented by the concepts and statements
of relation between them. According to this view, two main pathways for
data analysis are... |  |  Encyclopedia of Cryptology
Secret writing for the transmission of messages has been practiced for nearly 4,000 years. According to David Kahn, the great historian of cryptology, the first example of an intentionally altered message can be traced to a tomb in ancient Egypt dated about 1900 b.c. In the 40 centuries since that... |
|
 Web2py Enterprise Web Framework, 2nd Ed
I am guilty! After publicly complaining about the existence of too many
Python based web frameworks, after praising the merits of Django, Pylons,
TurboGears, CherryPy, and web.py, after having used them professionally
and taught them in University level courses, I could not resist and created one
more: web2py.
Why did I... |  |  Fuzzy Logic with Engineering Applications, Third Edition
The first edition of Fuzzy Logic with Engineering Applications (1995) was the first classroom text for undergraduates in the field. Now updated for the second time, this new edition features the latest advances in the field including material on expansion of the MLFE method using genetic algorithms, cognitive mapping, fuzzy agent-based... |  |  Actors in Scala
Recent trends in computer architecture make concurrency and parallelism an essential ingredient of efficient program execution. The actor model of concurrency allows you to express real-world concurrency in a natural way using concurrent processes that communicate via asynchronous messages.
Scala is a programming language for the Java... |
|
Result Page: 563 562 561 560 559 558 557 556 555 554 553 552 551 550 549 548 547 546 545 |