Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Applying Computational Intelligence: How to Create Value
Applying Computational Intelligence: How to Create Value

The flow of academic ideas in the area of computational intelligence is impacting industrial practice at considerable speed. Practitioners face the challenge of tracking, understanding and applying the latest techniques, which often prove their value even before the underlying theories are fully understood. This book offers realistic guidelines...

Numerical Solution of Partial Differential Equations on Parallel Computers
Numerical Solution of Partial Differential Equations on Parallel Computers

Since the dawn of computing, the quest for a better understanding of Nature has been a driving force for technological development. Groundbreaking achievements by great scientists have paved the way from the abacus to the supercomputing power of today. When trying to replicate Nature in the computer’s silicon test tube, there is need...

Natural Language Processing and Information Systems: 16th International Conference on Applications of Natural Language to Information Systems
Natural Language Processing and Information Systems: 16th International Conference on Applications of Natural Language to Information Systems

The 16th International Conference on Applications of Natural Language to Information Systems (NLDB 2011) was held during June 28–30, 2011, at the University of Alicante, Spain. Since the first NLDB conference in 1995, the main goal has been to provide a forum for the discussion and dissemination of research on the integration of...

The Motorola Xoom: Visual QuickStart Guide
The Motorola Xoom: Visual QuickStart Guide

Back in the early 1990s—1993, to be exact—Apple Computer launched a handheld computer product known as the Newton. Interestingly, the Newton was the first device to be called a personal digital assistant (PDA), a term that lives on today. Essentially, it was the first tablet computer. The one thing that most folks...

Securing the Cloud: Cloud Computer Security Techniques and Tactics
Securing the Cloud: Cloud Computer Security Techniques and Tactics

This book will prove to be a practical resource for anyone who is considering using, building, or securing a cloud implementation. Security professionals may refer to this book as a source of detailed information for evaluating and verifying cloud security policy and requirements. Cloud infrastructure engineers, cloud services...

Computer Vision Systems: 8th International Conference, ICVS 2011, Sophia Antipolis, France, September 20-22, 2011, Proceedings
Computer Vision Systems: 8th International Conference, ICVS 2011, Sophia Antipolis, France, September 20-22, 2011, Proceedings
Computer Vision is the science and technology of machines that see. The dominant scientific conferences in computer vision, such as ICCV, CVPR and ECCV, concentrate on theories and models for obtaining information from images and image sequences. The intensely competitive nature of these conferences leaves little room to...
Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises
Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises

After the mainframe and personal computer eras, the third major era in computer science, ubiquitous computing, describes the state of technology in which networked computers would surround every user.

Ubiquitous Computing Technology for Real Time Enterprises combines the fundamental methods, algorithms, and concepts of...

Applied Computing in Medicine and Health (Emerging Topics in Computer Science and Applied Computing)
Applied Computing in Medicine and Health (Emerging Topics in Computer Science and Applied Computing)

Applied Computing in Medicine and Health is a comprehensive presentation of on-going investigations into current applied computing challenges and advances, with a focus on a particular class of applications, primarily artificial intelligence methods and techniques in medicine and health.

Applied computing is the use of...

Parallel Programming with Co-arrays (Chapman & Hall/CRC Computational Science)
Parallel Programming with Co-arrays (Chapman & Hall/CRC Computational Science)

Parallel Programming with Co-Arrays describes the basic techniques used to design parallel algorithms for high-performance, scientific computing. It is intended for upper-level undergraduate students and graduate students who need to develop parallel codes with little or no previous introduction to parallel...

Maya: Secrets of the Pros
Maya: Secrets of the Pros
In this unique full-color book, a cadre of professionals led by Maya expert and best-selling author, John Kundert-Gibbs, team up to share what they’ve learned using Maya in the CG trenches.

Contributing authors include veterans of such high-profiles projects as The Lord of the Rings trilogy, Final Fantasy: The Spirits...

eMbedded Visual Basic: Windows CE and Pocket PC Mobile Applications
eMbedded Visual Basic: Windows CE and Pocket PC Mobile Applications
This book is an in-depth exploration into eVB's inherent features, and how to use them to solve likely mobile application programming tasks. After reading the book the reader will be able to write applications tackling a wide array of business problems for Windows CE-powered devices, both customized and for PocketPC and Handheld PC products. This...
Easy Microsoft Frontpage 2003
Easy Microsoft Frontpage 2003

Easy Microsoft FrontPage 2003 takes the work out of learning Microsoft FrontPage 2003 by using short, easy-to-follow lessons that show you how to accomplish basic tasks quickly and efficiently! It is the perfect book for beginners who want to learn to use FrontPage 2003 through a visual, full-color approach. More than 100 hands-on lessons are...

unlimited object storage image
Result Page: 219 218 217 216 215 214 213 212 211 210 209 208 207 206 205 204 203 202 201 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy