Home | Amazing | Today | Tags | Publishers | Years | Search 
Processor Microarchitecture: An Implementation Perspective (Synthesis Lectures on Computer Architecture)
Processor Microarchitecture: An Implementation Perspective (Synthesis Lectures on Computer Architecture)

Computers are at the heart of most activities nowadays. A processor is the central component of a computer, but nowadays, we can find processors embedded in many other components, such as game consoles, consumer electronic devices and cars, just to mention a few.

This lecture presents a thorough study of the microarchitecture...

Corporate Information Strategy and Management
Corporate Information Strategy and Management

"Corporate Information Strategy and Management: Text and Cases 8/e" by Applegate, Austin, and Soule is written for students and managers who desire an overview of contemporary information systems technology management. This new edition examines how information technology (IT) enables organizations to conduct business in radically...

Managing the Dynamics of New Product Development Processes: A New Product Lifecycle Management Paradigm
Managing the Dynamics of New Product Development Processes: A New Product Lifecycle Management Paradigm

In contemporary globally competitive markets, the development of new products is considered a critical success factor for organizations. Significant efforts have been invested in the development of methods and tools for improving the management of design processes, being a key element in development processes, especially those related...

Information Systems Strategic Management: An Integrated Approach (Routledge Information Systems Textbooks)
Information Systems Strategic Management: An Integrated Approach (Routledge Information Systems Textbooks)

This comprehensive guide to the strategic management of information systems within business and public sector organizations integrates the two, often disparate, domains of strategic management and information systems.  Focusing on managing information systems within a broader organizational context, it covers key issues...

Machine Learning for Hackers
Machine Learning for Hackers

To explain the perspective from which this book was written, it will be helpful to define the terms machine learning and hackers.

What is machine learning? At the highest level of abstraction, we can think of machine learning as a set of tools and methods that attempt to infer patterns and extract insight from a record of the...

Movies Made for Television: 1964-2004 (5 Volume Set)
Movies Made for Television: 1964-2004 (5 Volume Set)
Movies Made for Television in 2004 celebrates 40 full television seasons. As I wrote in the introduction in 1980 to the original (single) volume that chronicled the genre, the range was as esthetically and technically wide at the time as it would remain through the years since as any theatrical offerings – within its restricted...
Communicating with XML
Communicating with XML
XML (Extensible Markup Language) is the lingua franca in contemporary networked environments. It is intended to support communication between software modules, particularly on the Web, as well as communication between people involved in developing new XML-based solutions. Developing the new solutions for a specifi c domain or...
Object-Oriented Programming with Visual Basic.NET
Object-Oriented Programming with Visual Basic.NET
Visual Basic is arguably the most popular application development programming language in use today. Thousands, if not millions, of programmers use it every day to build both commercial and scientific applications. The language is also one of the most maligned programming languages, second perhaps only to Cobol.

...
Machine Learning for Email: Spam Filtering and Priority Inbox
Machine Learning for Email: Spam Filtering and Priority Inbox
To explain the perspective from which this book was written, it will be helpful to define the terms machine learning and hackers.

What is machine learning? At the highest level of abstraction, we can think of machine learning as a set of tools and methods that attempt to infer patterns and extract
...
Human - Computer Systems Interaction: Backgrounds and Applications 2: Part 1
Human - Computer Systems Interaction: Backgrounds and Applications 2: Part 1
A new procedure for combined validation of learning models – built for specifically uncertain data – is briefly described. The procedure, called the queue validation, relies on a combination of resubstitution with the modified learn-andtest paradigm. In the initial experiment [Burda and Hippe 2010] the developed...
Multimedia Image and Video Processing, Second Edition (Image Processing Series)
Multimedia Image and Video Processing, Second Edition (Image Processing Series)
We have witnessed significant advances in multimedia research and applications due to the rapid increase in digital media, computing power, communication speed, and storage capacity. Multimedia has become an indispensable aspect in contemporary daily life, and we can feel its presence in many applications ranging from online...
A Companion to Rhetoric and Rhetorical Criticism (Blackwell Companions to Literature and Culture)
A Companion to Rhetoric and Rhetorical Criticism (Blackwell Companions to Literature and Culture)

The essays in A Companion to Rhetoric and Rhetorical Criticism explore rhetoric as a practical art of deliberation and judgment, best taught and learned through concrete examples of argument, interpretation, and criticism. Historically and in our own time scholars have shown that rhetoric can very well be theorized in the strong sense that...

Result Page: 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy