Scala Functional Programming Patterns
Grok and perform effective functional programming in Scala
About This Book
Understand functional programming patterns by comparing them with the traditional object-oriented design patterns
Write robust, safer, and better code using the declarative programming paradigm
Bayesian Networks and Influence Diagrams: A Guide to Construction and Analysis (Information Science and Statistics) Probabilistic networks, also known as Bayesian networks and influence diagrams, have become one of the most promising technologies in the area of applied artificial intelligence, offering intuitive, efficient, and reliable methods for diagnosis, prediction, decision making, classification, troubleshooting, and data mining under uncertainty.... Learning Analytics in R with SNA, LSA, and MPIA
This book introduces Meaningful Purposive Interaction Analysis (MPIA) theory, which combines social network analysis (SNA) with latent semantic analysis (LSA) to help create and analyse a meaningful learning landscape from the digital traces left by a learning community in the co-construction of knowledge.
Measurement Systems And Sensors
One of the tendencies in measurement technology development is the development
of measurement systems. By the measurement systems, we refer to a set
of material and organizational resources, as well as programs for information
processing, aggregated in order to obtain, transmit, and process measuring data,
and to display and... Probability Theory: A Comprehensive Course (Universitext)
This second edition of the popular textbook contains a comprehensive course in modern probability theory. Overall, probabilistic concepts play an increasingly important role in mathematics, physics, biology, financial engineering and computer science. They help us in understanding magnetism, amorphous media, genetic diversity and the perils...
An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics) This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the construction and security analysis of diverse cryptosystems. Only basic linear algebra is required...
|Result Page: 57 56 55 54 53 52 51 50 49 48 |