Home | Amazing | Today | Tags | Publishers | Years | Search 
Carpenter's Complete Guide to the SAS Macro Language, 2nd Edition
Carpenter's Complete Guide to the SAS Macro Language, 2nd Edition

Art Carpenter thoroughly updates his successful first edition with an extensive collection of new examples and techniques. Addressing the composition and operation of the SAS macro facility and the SAS macro language, Carpenter's Complete Guide to the SAS Macro Language, Second Edition, is filled with ready-to-use macros, macro functions,...

Cloud Computing: First International Conference, CloudComp 2009, Munich, Germany, October 19-21, 2009
Cloud Computing: First International Conference, CloudComp 2009, Munich, Germany, October 19-21, 2009

Welcome to the proceedings ofCloudComp 2009.

Acomputing cloudis more thana collection of computer resources, because it provides mechanisms to manage those resources. In a cloud computing platform, software is migrating from the desktop to the "clouds," promising users, at any time and anywhere, access to their...

Logic-Based Artificial Intelligence
Logic-Based Artificial Intelligence

This landmark volume represents the culmination of over 40 years of research in the use of logic as a basis for representing and manipulating problems in the field of artificial intelligence. The use of logic as a basis for commonsense reasoning was started by John McCarthy in 1959. The collection consists of both original research and...

Encyclopedia of Biometrics (Springer Reference)
Encyclopedia of Biometrics (Springer Reference)

The Encyclopedia of Biometrics provides a comprehensive reference to concepts, technologies, issues, and trends in the field of biometrics. The volume covers all important aspects – research, development, and applications, including biometric sensors and devices, methods and algorithms, sample quality, system design and...

Computers, Phones, and the Internet: Domesticating Information Technology
Computers, Phones, and the Internet: Domesticating Information Technology

During the past decade, technology has become more pervasive, encroaching more and more on our lives. Computers, cell phones, and the internet have an enormous influence not only on how we function at work, but also on how we communicate and interact outside the office. Researchers have been documenting the effect that these types of...

Aspects of Soft Computing, Intelligent Robotics and Control (Studies in Computational Intelligence)
Aspects of Soft Computing, Intelligent Robotics and Control (Studies in Computational Intelligence)

Soft computing, as a collection of techniques exploiting approximation and tolerance for imprecision and uncertainty in traditionally intractable problems, has become very effective and popular especially because of the synergy derived from its components. The integration of constituent technologies provides complementary methods that allow...

Search-Based Applications: At the Confluence of Search and Database Technologies
Search-Based Applications: At the Confluence of Search and Database Technologies

What will data management technologies look like in ten years? While the future's difficult to predict, this book provides students, researchers and professionals alike with a brief and engaging look at one prescient trend: the convergence of search and database technologies. This convergence has given rise to a new breed of...

Data Mining in Public and Private Sectors: Organizational and Government Applications (Premier Reference Source)
Data Mining in Public and Private Sectors: Organizational and Government Applications (Premier Reference Source)

Data mining has developed rapidly and has become very popular in the past two decades, but actually has its origin in the early stages of IT, then being mostly limited to one-dimensional searching in databases. The statistical basis of what is now also referred to as data mining has often been laid centuries ago. In corporate...

Windows 7 Inside Out, Deluxe Edition
Windows 7 Inside Out, Deluxe Edition

By some measures, Windows 7 sets a new standard for usability. It needs less out-of-the-box tweaking and troubleshooting than any Windows version we’ve ever used. The arrangement of folders and files in Windows Explorer, basic system security, User Account Control settings, and numerous other default configuration options are...

Knowledge Processing and Data Analysis: First International Conference, KONT 2007, Novosibirsk, Russia
Knowledge Processing and Data Analysis: First International Conference, KONT 2007, Novosibirsk, Russia

This volume collects the proceedings of two related international conferences on foundations and practical applications of mathematical methods of data analysis, of Formal Concept Analysis and of methods for information extraction from natural language texts. The first conference, named Knowledge - Ontology - Theory 2007 (KONT 2007),...

Pattern Recognition From Classical to Modern Approaches
Pattern Recognition From Classical to Modern Approaches

Recognizing patterns is at the core of man's attempts to understand the universe that we inhabit. Through the development of sensors and instruments, we have extended our ability to gather data far beyond the range and scale of man's natural senses. As a result we are now able to gather data on phenomena occurring in the far reaches...

Cisco Firewalls (Networking Technology: Security)
Cisco Firewalls (Networking Technology: Security)

Networks today have outgrown exponentially both in size and complexity, becoming more multifaceted and increasingly challenging to secure. The blueprint of a core network requires a strong foundation, which can be simply provided with an integrated firewall architecture cemented at the core of the system. Today, the firewall has become...

Result Page: 137 136 135 134 133 132 131 130 129 128 127 126 125 124 123 122 121 120 119 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy