Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Web Page Recommendation Models: Theory and Algorithms (Synthesis Lectures on Data Management)
Web Page Recommendation Models: Theory and Algorithms (Synthesis Lectures on Data Management)

One of the application areas of data mining is the World Wide Web (WWW or Web), which serves as a huge, widely distributed, global information service for every kind of information such as news, advertisements, consumer information, financial management, education, government, e-commerce, health services, and many other information services....

Broadband Powerline Communications: Network Design
Broadband Powerline Communications: Network Design
Broadband Powerline Communications: Network Design covers the applications of broadband PLC systems in low-voltage supply networks, a promising candidate for the realization of cost effective solutions for "last mile" communications networks. There are many activities surrounding the development and application of PLC technology...
Intelligent Environments: Methods, Algorithms and Applications (Advanced Information and Knowledge Processing)
Intelligent Environments: Methods, Algorithms and Applications (Advanced Information and Knowledge Processing)
This innovative book discusses engineering solutions for the automatic understanding of a complex scene via multi-modal arrays of sensors. It focuses on research dealing with robotic platforms that augment an environment. In particular, it considers the study of information fusion methods, the study of algorithms for ontology learning from tabula...
Hardware Acceleration of EDA Algorithms: Custom ICs, FPGAs and GPUs
Hardware Acceleration of EDA Algorithms: Custom ICs, FPGAs and GPUs

This book deals with the acceleration of EDA algorithms using hardware platforms such as FPGAs and GPUs. Widely applied CAD algorithms are evaluated and compared for potential acceleration on FPGAs and GPUs. Coverage includes discussion of conditions under which it is preferable to use one platform over another, e.g., when an EDA problem has...

Advanced Techniques in Knowledge Discovery and Data Mining
Advanced Techniques in Knowledge Discovery and Data Mining
Data mining and knowledge discovery (DMKD) is a rapidly expanding field in computer science. It has become very important because of an increased demand for methodologies and tools that can help the analysis and understanding of huge amounts of data generated on a daily basis by institutions like hospitals, research laboratories, banks, insurance...
Biometric System and Data Analysis: Design, Evaluation, and Data Mining
Biometric System and Data Analysis: Design, Evaluation, and Data Mining
Biometric systems are being used in more places and on a larger scale than ever before. As these systems mature, it is vital to ensure the practitioners responsible for development and deployment, have a strong understanding of the fundamentals of tuning biometric systems.  The focus of biometric research over the past four decades has...
Static Analysis of Software: The Abstract Interpretation (ISTE)
Static Analysis of Software: The Abstract Interpretation (ISTE)

The existing literature currently available to students and researchers is very general, covering only the formal techniques of static analysis.

This book presents real examples of the formal techniques called "abstract interpretation" currently being used in various industrial fields: railway, aeronautics, space,...

The Complete Guide to Software Testing
The Complete Guide to Software Testing

The Complete Guide to Software Testing Bill Hetzel Gain a new perspective to software testing as a life cycle activity, not merely as something that happens at the end of coding. This edition is completely revised and contains new chapters on testing methodologies including ANSI standard-based testing—a survey of testing practices. Dr....

Kali Linux: Assuring Security By Penetration Testing
Kali Linux: Assuring Security By Penetration Testing

Master the art of penetration testing with Kali Linux

Overview

  • Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
  • Explore the insights and importance of testing your corporate network systems before the hackers strike
  • Understand the...
Art of Java Web Development: Struts, Tapestry, Commons, Velocity, JUnit, Axis, Cocoon, InternetBeans, WebWork
Art of Java Web Development: Struts, Tapestry, Commons, Velocity, JUnit, Axis, Cocoon, InternetBeans, WebWork
A guide to the skills required for state-of-the-art web development, this book covers a variety of web development frameworks. The uses of the standard web API to create applications with increasingly sophisticated architectures are highlighted, and a discussion of the development of industry-accepted best practices for architecture is...
Parallel Evolutionary Computations (Studies in Computational Intelligence)
Parallel Evolutionary Computations (Studies in Computational Intelligence)
"Parallel Evolutionary Computation" focuses on the aspects related to the parallelization of evolutionary computations, such as parallel genetic operators, parallel fitness evaluation, distributed genetic algorithms, and parallel hardware implementations, as well as on their impact on several applications.The book is divided into four...
Trustworthy Computing: Analytical and Quantitative Engineering Evaluation
Trustworthy Computing: Analytical and Quantitative Engineering Evaluation
"The book itself is a commendable achievement, and it deals with the security and software reliability theory in an integrated fashion with emphasis on practical applications to software engineering and information technology. It is an excellent and unique book and definitely a seminal contribution and first of its kind."

...

unlimited object storage image
Result Page: 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy