Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Reservoir Engineering Handbook
Reservoir Engineering Handbook
"...this publication provides a comprehensive and up-to-date reference tool for the reservoir engineer or reservoir engineering student. It covers reservoir fluid behaviour and properties, including laboratory analysis and reservoir fluid flow. It provides a guide to predicting oil reservoir performance through analysis of oil recovery...
Swarm Intelligent Systems (Studies in Computational Intelligence)
Swarm Intelligent Systems (Studies in Computational Intelligence)
This volume offers a wide spectrum of sample works developed in leading research throughout the world about innovative methodologies of swarm intelligence and foundations of engineering swarm intelligent systems as well as applications and interesting experiences using the particle swarm optimisation. Swarm intelligence is an innovative...
Soft Computing in Ontologies and Semantic Web (Studies in Fuzziness and Soft Computing)
Soft Computing in Ontologies and Semantic Web (Studies in Fuzziness and Soft Computing)
Being the important means by which people acquire and publish information nowadays, theWeb has been a huge information resource depository all around the world and the huge amount of information on the Web is getting larger and larger every day. It is becoming very crucial for computer programs to deal with information on the Web automatically and...
Behavioral Addictions: Criteria, Evidence, and Treatment
Behavioral Addictions: Criteria, Evidence, and Treatment

"Behavioral Addictions is a timely landmark achievement and a must read for anyone interested in addictive and compulsive behavior and its treatment. Rosenberg and Feder have brought us leading addiction experts, who clearly present the growing evidence for including behavioral addictions in the DSM-5 and how best to treat...

Code: Version 2.0
Code: Version 2.0
The "alarming and impassioned"* book on how the Internet is redefining constitutional law, now reissued as the first popular book revised online by its readers (*New York Times)

There's a common belief that cyberspace cannot be regulated-that it is, in its very essence, immune from the government's (or anyone else's)...

Recursive Methods in Economic Dynamics
Recursive Methods in Economic Dynamics
A magnificent work that is bound to have immense influence on the ways economists think about dynamic systems for many years to come. My own guess is that this book will eventually acquire the stature, say, of Hicks's Value and Capital or Samuelson's Foundations.
--Thomas J. Sargent, Hoover Institution

The
...
Design Methods for Reactive Systems: Yourdon, Statemate, and the UML
Design Methods for Reactive Systems: Yourdon, Statemate, and the UML
Design Methods for Reactive Systems describes methods and techniques for the design of software systemsparticularly reactive software systems that engage in stimulus-response behavior. Such systems, which include information systems, workflow management systems, systems for e-commerce, production control systems, and embedded...
Simulating Continuous Fuzzy Systems (Studies in Fuzziness and Soft Computing)
Simulating Continuous Fuzzy Systems (Studies in Fuzziness and Soft Computing)
This book is the companion text to Simulating Fuzzy Systems which investigated discrete fuzzy systems through crisp discrete simulation. The current book studies continuous fuzzy dynamical systems using crisp continuous simulation. We start with a crisp continuous dynamical system whose evolution depends on a system of ordinary differential...
Expert MySQL
Expert MySQL
Since the enormous number of new features made available with MySQL release 5.0, MySQL has been gaining steam as a viable alternative to database behemoths like Oracle and IBM DB2. MySQL users now have the ability to extend MySQL with new SQL commands, optimize query execution, and embed MySQL within low-resource environments like embedded devices...
Outspoken: Free Speech Stories
Outspoken: Free Speech Stories
"America's national obsession with asserting, and quelling, free-speech comes alive in this collection of profiles of First Amendment firebrands.Ê.Ê.Ê. The author goes beyond the usual polarized corners of political correctness.Ê.Ê.Ê.Êher nuanced treatment of all sides of the debate makes this a...
Agent Intelligence Through Data Mining (Multiagent Systems, Artificial Societies, and Simulated Organizations)
Agent Intelligence Through Data Mining (Multiagent Systems, Artificial Societies, and Simulated Organizations)

Knowledge, hidden in voluminous data repositories routinely created and maintained by today’s applications, can be extracted by data mining. The next step is to transform this discovered knowledge into the inference mechanisms or simply the behavior of agents and multi-agent systems. Agent Intelligence Through Data Mining addresses this...

Dreaming in Code: Two Dozen Programmers, Three Years, 4,732 Bugs, and One Quest for Transcendent Software
Dreaming in Code: Two Dozen Programmers, Three Years, 4,732 Bugs, and One Quest for Transcendent Software
Our civilization runs on software. Yet the art of creating it continues to be a dark mystery, even to the experts, and the greater our ambitions, the more spectacularly we seem to fail.

Big software projects regularly crash and burn--just ask the FBI and the IRS, the Pentagon and the FAA, or any decent-size corporation. The...

unlimited object storage image
Result Page: 98 97 96 95 94 93 92 91 90 89 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy