Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics)
Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics)

Master Bayesian Inference through Practical Examples and Computation–Without Advanced Mathematical Analysis

 

Bayesian methods of inference are deeply natural and extremely powerful. However, most discussions of Bayesian inference rely...

Microsoft Azure: Enterprise Application Development
Microsoft Azure: Enterprise Application Development

This fast-paced guide enables developers to design and build Enterprise applications for the cloud. You will find it easy to follow this book, as the authors use an actual online portal application for the case study. Throughout the development of the sample application there is discussion of important considerations for moving an application...

Threat Forecasting: Leveraging Big Data for Predictive Analysis
Threat Forecasting: Leveraging Big Data for Predictive Analysis

Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop...

Computer Vision Metrics: Survey, Taxonomy, and Analysis
Computer Vision Metrics: Survey, Taxonomy, and Analysis

Computer Vision Metrics provides an extensive survey and analysis of over 100 current and historical feature description and machine vision methods, with a detailed taxonomy for local, regional and global features. This book provides necessary background to develop intuition about why interest point detectors and feature descriptors...

Dynamic Speech Models (Synthesis Lectures on Speech and Audio Processing)
Dynamic Speech Models (Synthesis Lectures on Speech and Audio Processing)
In a broad sense, speech dynamics are time-varying or temporal characteristics in all stages of the human speech communication process. This process, sometimes referred to as speech chain [1], starts with the formation of a linguistic message in the speaker’s brain and ends with the arrival of the message in the...
Instant GIMP Starter
Instant GIMP Starter

Image manipulation is being used by professionals all over the world. Beautiful pictures can be achieved by combining technology with art. GIMP. the GNU Image Manipulation Program, makes them accessible to everyone. GIMP is. With it, anyone can express their emotional and intellectual capability in a new dimension.

"Instant...

Business Calculus Demystified
Business Calculus Demystified

Take the FEAR OUT of Business Calculus

Business Calculus Demystified clarifies the concepts and processes of calculus and demonstrates their applications to the workplace. Best-selling math author Rhonda Huettenmueller uses the same combination of winning step-by-step teaching techniques and real-world business and...

Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure
Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure
Cyber security is big business today. Smart Grid is big business today. Therefore let’s put the two together and write a book? Well, surely there will be some individuals that may make that assumption as to the motivation behind the publication of this book. The real motivation behind the development of this book is because...
Modeling and Reasoning with Bayesian Networks
Modeling and Reasoning with Bayesian Networks

Bayesian networks have received a lot of attention over the last few decades from both scientists and engineers, and across a number of fields, including artificial intelligence (AI), statistics, cognitive science, and philosophy.

Perhaps the largest impact that Bayesian networks have had is on the field of AI, where they were...

Common Warehouse Metamodel Developer's Guide
Common Warehouse Metamodel Developer's Guide
The official guide on how to develop interoperable data warehouse and business intelligence applications from the authors of the CWM specification

This authoritative guide will show you how to develop interoperable data warehouse and business intelligence applications using the Common Warehouse Metamodel (CWM) specification. It provides you...

Computer Graphics for Artists: An Introduction
Computer Graphics for Artists: An Introduction

Computer Graphics for Artists: an introduction is an application-independent, reader-friendly primer for anyone with a serious desire to understand 3D Computer Graphics

Opening with the first and most basic elements of computer graphics, the book rapidly advances into progressively more complex concepts. Each of the elements,...

Sudoku Programming with C
Sudoku Programming with C

Sudoku Programming with C teaches you how to write computer programs to solve and generate Sudoku puzzles. This is a practical book that will provide you with everything you need to write your own books of Sudoku Classic and Samurai puzzles. But be warned: after reading it, you'll discover that the puzzles in...

Result Page: 28 27 26 25 24 23 22 21 20 19 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy