 |
|
 Software Design X-Rays: Fix Technical Debt with Behavioral Code Analysis
Are you working on a codebase where cost overruns, death marches, and heroic fights with legacy code monsters are the norm? Battle these adversaries with novel ways to identify and prioritize technical debt, based on behavioral data from how developers work with code. And that's just for starters. Because good code involves... |  |  Cybersecurity Law
A definitive guide to cybersecurity law
Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information... |  |  Handbook on Metalloproteins
This Handbook on Metalloproteins focuses on the available structural information of proteins and their metal ion coordination spheres. It centers on the metal ions indispensable for life but also considers metal ions used as substitution probes in studies of metalloproteins. Emphasizing the structure-function relationship, the book covers the... |
|
|
 Principles of Data Integration
How do you approach answering queries when your data is stored in multiple databases that were designed independently by different people? This is first comprehensive book on data integration and is written by three of the most respected experts in the field.
This book provides an extensive introduction to the theory and concepts... |  |  Governing the Euro Area in Good Times and Bad
Can the euro area survive without a more centralized economic policy? What lessons can be drawn from Economic and Monetary Union about new modes of policy-making in the European Union? Have euro area members spoken with one voice on the international stage and what does this mean for the European Union's ambitions to be a global actor in... |  |  Plan, Activity, and Intent Recognition: Theory and Practice
Plan recognition, activity recognition, and intent recognition together combine and unify techniques from user modeling, machine vision, intelligent user interfaces, human/computer interaction, autonomous and multi-agent systems, natural language understanding, and machine learning.
Plan, Activity, and Intent Recognition... |
|
|
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |