Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Applied Text Analysis with Python: Enabling Language-Aware Data Products with Machine Learning
Applied Text Analysis with Python: Enabling Language-Aware Data Products with Machine Learning

From news and speeches to informal chatter on social media, natural language is one of the richest and most underutilized sources of data. Not only does it come in a constant stream, always changing and adapting in context; it also contains information that is not conveyed by traditional data sources. The key to unlocking natural...

Scheduling: Theory, Algorithms, and Systems
Scheduling: Theory, Algorithms, and Systems

Sequencing and scheduling is a formof decision-making that plays a crucial role in manufacturing and service industries. In the current competitive environment effective sequencing and scheduling has become a necessity for survival in the market-place. Companies have to meet shipping dates that have been committed to customers, as failure to...

The Blockchain Alternative: Rethinking Macroeconomic Policy and Economic Theory
The Blockchain Alternative: Rethinking Macroeconomic Policy and Economic Theory

Examine what would happen if we were to deploy blockchain technology at the sovereign level and use it to create a decentralized cashless economy. This book explains how finance and economics work today, and how the convergence of various technologies related to the financial sector can help us find solutions to problems,...

TypeScript Design Patterns
TypeScript Design Patterns

Key Features

  • This step-by-step guide will would demonstrate all the important design patterns in practice
  • This book is the only documentation on the market focusing on design patterns in TypeScript
  • This book is packed with rich examples that will improve...
Switching to Angular 2
Switching to Angular 2

Key Features

  • Get up to date with the latest changes to Angular 2, including the improvements to directives, change detection, dependency injection, router, and more
  • Understand Angular 2's new component-based architecture
  • Start using TypeScript to supercharge your Angular 2...
Learning Reactive Programming With Java 8
Learning Reactive Programming With Java 8

Learn how to use RxJava and its reactive Observables to build fast, concurrent, and powerful applications through detailed examples

About This Book

  • Learn about Java 8's lambdas and what reactive programming is all about, and how these aspects are utilized by RxJava
  • Build fast and...
Cryptanalytic Attacks on RSA
Cryptanalytic Attacks on RSA
RSA is the first workable and practicable public-key cryptographic system, based on the use of large prime numbers. It is also the most popular and widely-used cryptographic system in today's digital world, for which its three inventors Rivest, Shamir and Adleman received the year 2002 Turing Award, the equivalent Nobel Prize in Computer Science....
Quantum Computer Science (Synthesis Lectures on Quantum Computing)
Quantum Computer Science (Synthesis Lectures on Quantum Computing)
In this text we present a technical overview of the emerging field of quantum computation along with new research results by the authors. What distinguishes our presentation from that of others is our focus on the relationship between quantum computation and computer science. Specifically, our emphasis is on the computational model of quantum...
Java 9 Programming Blueprints
Java 9 Programming Blueprints

Key Features

  • See some of the new features of Java 9 and be introduced to parts of the Java SDK
  • This book provides a set of diverse, interesting projects that range in complexity from fairly simple to advanced and cover HTTP 2.0
  • Take advantage of Java's new modularity features to write...
An Introduction to Cryptography, Second Edition (Discrete Mathematics and Its Applications)
An Introduction to Cryptography, Second Edition (Discrete Mathematics and Its Applications)
Continuing a bestselling tradition, An Introduction to Cryptography, Second Edition provides a solid foundation in cryptographic concepts that features all of the requisite background material on number theory and algorithmic complexity as well as a historical look at the field. With numerous additions and restructured material, this edition...
Computational Complexity: A Conceptual Perspective
Computational Complexity: A Conceptual Perspective
This book offers a comprehensive perspective to modern topics in complexity theory, which is a central field of the theoretical foundations of computer science. It addresses the looming question of what can be achieved within a limited amount of time with or without other limited natural computational resources. Can be used as an introduction for...
Data Mining for Geoinformatics: Methods and Applications
Data Mining for Geoinformatics: Methods and Applications

The rate at which geospatial data is being generated exceeds our computational capabilities to extract patterns for the understanding of a dynamically changing world. Geoinformatics and data mining focuses on the development and implementation of computational algorithms to solve these problems. This unique volume contains a collection of...

Result Page: 93 92 91 90 89 88 87 86 85 84 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy