Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Human - Computer Systems Interaction: Backgrounds and Applications 2: Part 2 (Advances in Intelligent and Soft Computing)
Human - Computer Systems Interaction: Backgrounds and Applications 2: Part 2 (Advances in Intelligent and Soft Computing)
It is demonstrated that spectral characteristics of steady-state visual evoked potentials (SSVEPs) in a brain-computer interface (SSVEP-based BCI) depend significantly on the stimulus parameters, such as color and frequency of its flashing light. We postulate these dependencies can be used to improve the BCI performance –...
Evolutionary Algorithms (The IMA Volumes in Mathematics and its Applications)
Evolutionary Algorithms (The IMA Volumes in Mathematics and its Applications)

The IMA Workshop on Evolutionary Algorithms brought together many of the top researchers in the area of Evolutionary Computation for a week of intensive interaction. The field of Evolutionary Computation has developed significantly over the past 30 years and today consists of a variety of subfields such as genetic algorithms, evolution...

Beginning Entity Framework Core 2.0: Database Access from .NET
Beginning Entity Framework Core 2.0: Database Access from .NET
Use the valuable Entity Framework Core 2.0 tool in ASP.NET and the .NET Framework to eliminate the tedium around accessing databases and the data they contain.

Entity Framework Core 2.0 greatly simplifies access to relational databases such as SQL Server that are commonly deployed in corporate settings. By
...
Computer Network Time Synchronization: The Network Time Protocol
Computer Network Time Synchronization: The Network Time Protocol
This book is all about wrangling a herd of network computers so that all display the correct time. This may seem like a really narrow business, but the issues go far beyond winding the clock on your display taskbar. Carefully coordinated, reliable, and accurate time is vital for traffic control in the air and on the ground, buying and selling...
Information and Communications Technologies OECD Communications Outlook 2007
Information and Communications Technologies OECD Communications Outlook 2007
The OECD Communications Outlook provides an extensive range of indicators for different types of communications networks and compares performance indicators such as revenue, investment, employment and prices for service throughout the OECD area. These indicators are essential for industry and for regulators who use benchmarking to evaluate policy...
Information Modelling and Knowledge Bases XVIII:  Volume 154 Frontiers in Artificial Intelligence and Applications
Information Modelling and Knowledge Bases XVIII: Volume 154 Frontiers in Artificial Intelligence and Applications
In the last decades information modelling and knowledge bases have become hot topics not only in academic communities related to information systems and computer science but also in business areas where information technology is applied.

The 16th European-Japanese Conference on Information Modelling and Knowledge Bases EJC 2006 continues
...
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition

There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter.

If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the...

On Top of the Cloud: How CIOs Leverage New Technologies to Drive Change and Build Value Across the Enterprise
On Top of the Cloud: How CIOs Leverage New Technologies to Drive Change and Build Value Across the Enterprise

Praise for On Top of the Cloud

"21st-century CIOs have a dual responsibility: driving down costs and creating new business value. Managing this seeming dichotomy is the domain of top business executives everywhere, and CIOs everywhere are learning to step it up. The original research contained in Hunter's book...

iPhone Game Blueprints
iPhone Game Blueprints

If you're looking for inspiration for your first or next iPhone game, look no further. This brilliant hands-on guide contains 7 practical projects that cover everything from animation to augmented reality. Game on!

Overview

  • Seven step by step game projects for you to build
  • Cover all...
Korn Shell: Unix and Linux Programming Manual, Third Edition
Korn Shell: Unix and Linux Programming Manual, Third Edition
If you are a Unix or Linux Shell programmer, this book will provide you with the practical advice and technical tips you will need in order to become proficient in all aspects of the Korn Shell and enhance your programming skills. From basic introductory concepts through to advanced programming techniques, you will learn how to-
Customize
...
How to Do Everything with Microsoft Office Live
How to Do Everything with Microsoft Office Live
Get your e-business started with ease and quickly boost sales and productivity with help from this hands-on guide. How to Do Everything with Microsoft Office Live explains how to harness this all-in-one service to create and maintain a dynamic online presence for your business. Learn how to set up a commerce-driven website and take...
Orchard CMS: Up and Running
Orchard CMS: Up and Running
A few months back, I wanted to create an online presence for my band, Daisy’s Gone. In the past, I would have started from scratch. But I remembered all the domains I’ve accumulated over the years that are now nothing more than parking pages at my registrar. It’s generally not hard to throw...
unlimited object storage image
Result Page: 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy