Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Age Statistical Inference: Algorithms, Evidence, and Data Science (Institute of Mathematical Statistics Monographs)
Computer Age Statistical Inference: Algorithms, Evidence, and Data Science (Institute of Mathematical Statistics Monographs)
The twenty-first century has seen a breathtaking expansion of statistical methodology, both in scope and in influence. “Big data,” “data science,” and “machine learning” have become familiar terms in the news, as statistical methods are brought to bear upon the enormous data sets of modern science...
Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics)
Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics)

Master Bayesian Inference through Practical Examples and Computation–Without Advanced Mathematical Analysis

 

Bayesian methods of inference are deeply natural and extremely powerful. However, most discussions of Bayesian inference rely...

Sudoku Programming with C
Sudoku Programming with C

Sudoku Programming with C teaches you how to write computer programs to solve and generate Sudoku puzzles. This is a practical book that will provide you with everything you need to write your own books of Sudoku Classic and Samurai puzzles. But be warned: after reading it, you'll discover that the puzzles in...

Native Docker Clustering with Swarm
Native Docker Clustering with Swarm

Key Features

  • Get to grips with Docker Swarm, one of the key components of the Docker ecosystem.
  • Optimize Swarm and SwarmKit features for scaling massive applications through containers.
  • Learn about Docker’s scheduling tricks, high availability, security, and platform scalability.
  • ...
Kinematic Analysis of Robot Manipulators
Kinematic Analysis of Robot Manipulators

This text provides a first-level understanding of the structure, mobility, and analysis of serial manipulators. A serial manipulator is an unclosed or open movable polygon consisting of a series of links and joints. One end is fixed to ground, and attached to the open end is a hand or end effector that can move freely in space.

The...

Business and Competitive Analysis: Effective Application of New and Classic Methods
Business and Competitive Analysis: Effective Application of New and Classic Methods

“I believe that this book will fill a great need for both full-time competitive intelligence practitioners, and those looking to add analytical skills to their managerial tool kit.”
--Bill Fiora, Partner and Founder, Outward Insights

  

Migrating to Swift from Android
Migrating to Swift from Android

In 2000, I started my first PalmOS mobile app for an inventory-tracking project. The initial project was a full-staffed team effort that consisted of mobile developers, SAP consultants, supply-chain subject matter experts, middleware developers, QA testers, architects, business sponsors, and so forth. JavaME came up strong in 2002, followed...

HVDC and FACTS Controllers: Applications of Static Converters in Power Systems (Power Electronics and Power Systems)
HVDC and FACTS Controllers: Applications of Static Converters in Power Systems (Power Electronics and Power Systems)
HVDC and FACTS Controllers: Applications of Static Converters in Power Systems focuses on the technical advances and developments that have taken place in the past ten years or so in the fields of High Voltage DC transmission and Flexible AC transmission systems. These advances (in HVDC transmission and FACTS) have added a new dimension to power...
Learning Penetration Testing with Python
Learning Penetration Testing with Python

Utilize Python scripting to execute effective and efficient penetration tests

About This Book

  • Understand how and where Python scripts meet the need for penetration testing
  • Familiarise yourself with the process of highlighting a specific methodology to exploit an environment to fetch...
Process Improvement Essentials: CMMI, Six SIGMA, and ISO 9001
Process Improvement Essentials: CMMI, Six SIGMA, and ISO 9001

Today, technology has become too much a part of overall corporate success for its effectiveness to be left to chance. The stakes are too high. Fortunately, the idea of 'quality management' is being reinvigorated. In the last decade process programs have become more and more prevalent. And, out of all the available options,...

Architecting Mobile Solutions for the Enterprise
Architecting Mobile Solutions for the Enterprise
As far back as 1999, some smart guys predicted that mobile would become the primary focus of development in only a few years. Although it has taken a bit more time than expected, the era of mobile software has arrived at last. Why did it take so long? The answer is surprisingly simple: mobile software needed a critical mass of users...
Supply Chain Management Based on SAP Systems: Architecture and Planning Processes (SAP Excellence)
Supply Chain Management Based on SAP Systems: Architecture and Planning Processes (SAP Excellence)
Supply Chain Management (SCM) is not a buzzword like many others in management and IT - it is here to stay. "Megatrends" such as globalization and increasing specialization result in a complex division of labor at national and international levels. Lean and agile supply chains have become a major anagement target, and the...
Result Page: 28 27 26 25 24 23 22 21 20 19 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy