Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computational Intelligence, Theory and Applications (Advances in Soft Computing)
Computational Intelligence, Theory and Applications (Advances in Soft Computing)
For the 9th time since 1991 we invite researchers to participate in the Dortmund Fuzzy-Days. I am very glad that our conference has established itself as an international forum for the discussion of new results in the filed of Computational Intelligence. Again all papers had to undergo a thorough review: each one was judged by five referees to...
Scale Space and Variational Methods in Computer Vision: Second International Conference
Scale Space and Variational Methods in Computer Vision: Second International Conference

This book contains 71 original, scientific articles that address state-of-the-art research related to scale space and variational methods for image processing and computer vision. Topics covered in the book range from mathematical analysis of both established and new models, fast numerical methods, image analysis, segmentation,...

The New Language of Business: SOA & Web 2.0
The New Language of Business: SOA & Web 2.0
In The New Language of Business, senior IBM executive Sandy Carter demonstrates how to leverage SOA, Web 2.0, and related technologies to drive new levels of operational excellence and business innovation.

Writing for executives and business leaders inside and outside IT, Carter explains why flexibility and responsiveness...

Prospective Evaluation of Applied Energy Research and Development at DOE (Phase Two)
Prospective Evaluation of Applied Energy Research and Development at DOE (Phase Two)
In recent years, federal oversight of public expenditures has sought to integrate performance and budgeting. Notably, the Government Performance and Results Act (GPRA) was passed in 1993 “in response to questions about the value and effectiveness of federal programs” (GAO, 1997, p. 11). GPRA and other mandates...
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Words and Symbols: Language and Communication in Therapy (Core Concepts in Therapy)
Words and Symbols: Language and Communication in Therapy (Core Concepts in Therapy)
This book takes apart, lays out and repositions the most basic of therapeutic tools – the language used to communicate between therapist and client. It begins with a summary of the different schools of thought on language acquisition from infancy onwards. It addresses ways in which philosophical and social contexts may impact on the thoughts...
Information Systems for Sustainable Development
Information Systems for Sustainable Development
Information Systems for Sustainable Development provides a survey on approaches to information systems supporting sustainable development in the private or public sector. It also documents and encourages the first steps of environmental information processing towards this more comprehensive goal.

About the
...
The Professional Photographer's Legal Handbook
The Professional Photographer's Legal Handbook
Want to make a living in photography? Anyone who does needs this indispensable guide to licensing picture rights. In this accessible and entertaining book, expert Nancy E. Wolff explains copyright, trademark, contracts, and privacy. Real-world examples of cases, laws, and news items torn from today’s headlines illustrate the most...
Coherent Behavior in Neuronal Networks (Springer Series in Computational Neuroscience)
Coherent Behavior in Neuronal Networks (Springer Series in Computational Neuroscience)

Recent experimental research advances have led to increasingly detailed descriptions of how networks of interacting neurons process information. With these developments, it has become clear that dynamic network behaviors underlie information processing, and that the observed activity patterns cannot be fully explained by simple concepts such as...

Case-Based Reasoning Research and Development: Second International Conference on Case-Based Reasoning, ICCBR-97 Providence
Case-Based Reasoning Research and Development: Second International Conference on Case-Based Reasoning, ICCBR-97 Providence
In 1995, the first International Conference on Case-Based Reasoning (ICCBR) was held in Sesimbra, Portugal, as the start of a biennial series. ICCBR-97, the Second International Conference on Case-Based Reasoning, was held at Brown University in Providence, Rhode Island, on July 25-27, 1997. The goal of the conference was to achieve a vibrant...
Malware Forensics: Investigating and Analyzing Malicious Code
Malware Forensics: Investigating and Analyzing Malicious Code

Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and...

CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50
CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50
The EC-Council's Certified Ethical Hacker has emerged as one of today's most sought-after certifications. Now you can prepare for the CEH certification exam 312-50 with the only review guide officially endorsed by EC-Council.

Covering all exam objectives, from ethics and testing to securing wired and wireless networks, this concise, focused...

Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy