Home | Amazing | Today | Tags | Publishers | Years | Search 
Modeling Decision for Artificial Intelligence: 8th International Conference, MDAI 2011
Modeling Decision for Artificial Intelligence: 8th International Conference, MDAI 2011

This volume contains papers presented at the 8th International Conference on Modeling Decisions for Artificial Intelligence (MDAI 2011), held in Changsha, China, July 28-30. This conference followed MDAI 2004 (Barcelona, Catalonia, Spain),MDAI 2005 (Tsukuba, Japan),MDAI 2006 (Tarragona,Catalonia, Spain), MDAI 2007 (Kitakyushu,...

Ecological Modeling for Resource Management
Ecological Modeling for Resource Management

This book was developed from a workshop on the “Effective Use of Ecological Modeling in Management,” held in Oak Ridge, Tennessee, on October 23–26, 2000. The workshop was sponsored by the Department of Defense’s (DoD’s) Strategic Environmental Research and Development Program (SERDP), the Army Research...

Guide to Computer Forensics and Investigations
Guide to Computer Forensics and Investigations

The rapid advance of technology has changed and influenced how we think about gathering digital evidence. Soon after the attacks on the World Trade Center in New York City on September 11, 2001, many young men and women volunteered to serve their country in different ways. For those who did not choose the military, options included...

Securing the Smart Grid: Next Generation Power Grid Security
Securing the Smart Grid: Next Generation Power Grid Security

"The first step in securing the Smart Grid is to fully understand the threat landscape. This book provides both a timely and relevant overview of the subject - a must-read for anyone responsible for securing the grid as well as consumers looking to implement the technology!."-- Dr. Patrick Engebretson, Assistant Professor of...

Software Engineering for Image Processing Systems (Image Processing Series)
Software Engineering for Image Processing Systems (Image Processing Series)

This book is not intended to be a traditional software engineering text — there are many good ones. Instead, it is designed specifically for those involved in image processing systems. It provides a modern engineering framework for the specification, design, coding, testing, and maintenance of image processing software and...

Handbook of Natural Language Processing and Machine Translation: DARPA Global Autonomous Language Exploitation
Handbook of Natural Language Processing and Machine Translation: DARPA Global Autonomous Language Exploitation

This comprehensive handbook, written by leading experts in the field, details the groundbreaking research conducted under the breakthrough GALE program--The Global Autonomous Language Exploitation within the Defense Advanced Research Projects Agency (DARPA), while placing it in the context of previous research in the fields of natural...

Evolving Intelligent Systems: Methodology and Applications (IEEE Press Series on Computational Intelligence)
Evolving Intelligent Systems: Methodology and Applications (IEEE Press Series on Computational Intelligence)

One of the consequences of the information revolution is the ever-growing amount of
information we are surrounded with and the need to process this information
efficiently and extract meaningful knowledge. This phenomenon was termed “digital
obesity” or “information obesity” by Toshiba Ltd. One
...

Java EE 6 with GlassFish 3 Application Server
Java EE 6 with GlassFish 3 Application Server

This book is a practical guide with a very user-friendly approach. It aims to speed up the reader in Java EE 6 development. All major Java EE 6 APIs and the details of the GlassFish 3 server are covered followed by examples of its use. If you are a Java developer and wish to become proficient with Java EE 6, then this book is for you. You are...

Alfresco 3 Records Management
Alfresco 3 Records Management

This book is structured in a sequential way that walks you through the steps necessary to set up your Alfresco Records Management system. Chapters follow a logical progression with each chapter building on the knowledge and implementation details learned in earlier chapters. If you are a records manager, business analyst, or a software...

Secure Semantic Service-Oriented Systems
Secure Semantic Service-Oriented Systems

As the demand for data and information management continues to grow, so does the need to maintain and improve the security of databases, applications, and information systems. In order to effectively protect this data against evolving threats, an up-to-date understanding of the mechanisms for securing semantic Web technologies is...

Disaster Recovery (EC-Council Disaster Recovery Professional)
Disaster Recovery (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Virtualization Security (EC-Council Disaster Recovery Professional)
Virtualization Security (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy