Home | Amazing | Today | Tags | Publishers | Years | Search 
Creative Environments: Issues of Creativity Support for the Knowledge Civilization Age (Studies in Computational Intelligence)
Creative Environments: Issues of Creativity Support for the Knowledge Civilization Age (Studies in Computational Intelligence)
Creative Environments is a follow-up on the book Creative Space in the same series and by the same authors, serving this time as editors of a broader book on computational intelligence and knowledge engineering tools for supporting knowledge creation. This book contains four parts. The first part presents a further development of models of...
Soft Computing for Hybrid Intelligent Systems (Studies in Computational Intelligence)
Soft Computing for Hybrid Intelligent Systems (Studies in Computational Intelligence)
We describe in this book, new methods and applications of hybrid intelligent systems using soft computing techniques. Soft Computing (SC) consists of several intelligent computing paradigms, including fuzzy logic, neural networks, and evolutionary algorithms, which can be used to produce powerful hybrid intelligent systems. The book is organized in...
Hybrid Methods in Pattern Recognition
Hybrid Methods in Pattern Recognition
The discipline of pattern recognition has seen enormous progress since its beginnings more than four decades ago. Over the years various approaches have emerged, based on statistical decision theory, structural matching and parsing, neural networks, fuzzy logic, artificial intelligence, evolutionary computing, and others. Obviously, these...
Linkage in Evolutionary Computation (Studies in Computational Intelligence)
Linkage in Evolutionary Computation (Studies in Computational Intelligence)
In recent years, the issue of linkage in GEAs has garnered greater attention and recognition from researchers. Conventional approaches that rely much on ad hoc tweaking of parameters to control the search by balancing the level of exploitation and exploration are grossly inadequate. As shown in the work reported here, such parameters tweaking based...
Metaphors For God's Time in Science and Religion
Metaphors For God's Time in Science and Religion
Metaphors for God's Time in Science and Religion examines the exploratory work of metaphors for time in astrophysical cosmology, chaos theory, evolutionary biology and neuroscience. Stephen Happel claims that the Christian God is intimately involved at every level of physical and biological science. He compares how scientists and...
Interoperability of Enterprise Software and Applications
Interoperability of Enterprise Software and Applications
Interoperability: the ability of a system or a product to work with other systems or products without special effort from the user is a key issue in manufacturing and industrial enterprise generally. It is fundamental to the production of goods and services quickly and at low cost at the same time as maintaining levels of quality and customisation....
Optical Switching Networks
Optical Switching Networks
Optical Switching Networks describes all the major switching paradigms developed for modern optical networks, discussing their operation, advantages, disadvantages and implementation. Following a review of the evolution of optical WDM networks, an overview of the future trends out. The latest developments in optical access, local, metropolitan, and...
Temporal Data & the Relational Model (The Morgan Kaufmann Series in Data Management Systems)
Temporal Data & the Relational Model (The Morgan Kaufmann Series in Data Management Systems)
Temporal database systems are systems that provide special support for storing, querying, and updating historical and/or future data. Current DBMSs provide essentially no temporal features at all, but this situation is likely to change soon for a variety of reasons; in fact, temporal databases are virtually certain to become important sooner rather...
Malware Forensics: Investigating and Analyzing Malicious Code
Malware Forensics: Investigating and Analyzing Malicious Code

Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and...

Genetic Programming Theory and Practice VI (Genetic and Evolutionary Computation)
Genetic Programming Theory and Practice VI (Genetic and Evolutionary Computation)
Genetic Programming Theory and Practice VI was developed from the sixth workshop at the University of Michigan’s Center for the Study of Complex Systems to facilitate the exchange of ideas and information related to the rapidly advancing field of Genetic Programming (GP). Contributions from the foremost international...
IP Multimedia Subsystem (IMS) Handbook
IP Multimedia Subsystem (IMS) Handbook
The IP multimedia subsystem (IMS), established as the foundation for future wireless and wireline convergence, is the bedrock that will facilitate easy deployment on new, rich, personalized multimedia communication services that mix telecom and data services. Designers, planners, and researchers of communication systems will need to make full use...
The SIAM 100-Digit Challenge: A Study in High-Accuracy Numerical Computing
The SIAM 100-Digit Challenge: A Study in High-Accuracy Numerical Computing
"Destined to be a classic of modern computational science... a gourmet feast in ten courses." from the foreword by David H. Bailey, Lawrence Berkeley National Laboratory."

The authors, members of teams that solved all 10 problems, show in detail multiple approaches for solving each problem,
...
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy