Home | Amazing | Today | Tags | Publishers | Years | Search 
Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems: 7th International Conference
Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems: 7th International Conference

Cutting planes (cuts) are very popular in the OR community, where they are used to strengthen the Linear Programming (LP) relaxation of Mixed-Integer Programs (MIPs) in the hope of improving the performance of an exact LPbased solver. In particular, an intense research effort has been devoted to the study of families of general cuts,...

Migrating to iPhone and iPad for .NET Developers
Migrating to iPhone and iPad for .NET Developers

Ever since I spotted and started reading my first computer book in 1981, I knew Information Technology (IT) was going to be an important part of my life. I feel privileged to have been able to make a career out of something I enjoy, and the fact that it changes on what seems to be a monthly basis means it never gets boring. It still...

Pro Java 7 NIO.2 (Professional Apress)
Pro Java 7 NIO.2 (Professional Apress)

The recommended entry point to start exploring the NIO.2 API, also known as “JSR 203: More New I/O

APIs for the Java Platform” (NIO.2), is the new abstract class java.nio.file.Path. This class is a milestone of NIO.2, and every application that involves I/O operations will exploit the powerful facilities of this
...
Beginning Android 4 (Beginning Apress)
Beginning Android 4 (Beginning Apress)

Android is everywhere. Phones. Tablets. TVs and set-top boxes powered by Google TV. Soon, Android will be in cars, in in-flight entertainment systems on planes, and even in

robots!

However, the general theme of Android devices will be smaller screens and/or no hardware keyboard. And, by the numbers, Android
...
Algorithms and Complexity. Handbook of Theoretical Computer Science, Vol. A
Algorithms and Complexity. Handbook of Theoretical Computer Science, Vol. A
Modern developments in computer and software systems have raised many challeng ing issues concerning the design and efficiency of complex programming applica tions. There is an increasing need for "advanced theory", to understand and exploit basic concepts and mechanisms in computing and information processing. The...
Deformable Surface 3D Reconstruction from Monocular Images (Synthesis Lectures on Computer Vision)
Deformable Surface 3D Reconstruction from Monocular Images (Synthesis Lectures on Computer Vision)
Deformable surface 3D reconstruction from monocular images is an active area of research in the Computer Vision community. This encompasses recovering both the shape of thin objects that can be treated as surfaces without perceptible thickness and the visible envelope of fully 3D objects. Whereas this may seem easy for a human...
Coding for Penetration Testers: Building Better Tools
Coding for Penetration Testers: Building Better Tools

My Dear Reader,

This wretched war, the gravest threat humankind has ever faced, is not going well at all.We have suffered major setbacks, as our ruthless adversary has conquered vast territories, leaving little ground controlled by our ragtag band of rebels. Our few surviving generals blame the lack of skills in our fighting
...

Cloud Computing for Enterprise Architectures (Computer Communications and Networks)
Cloud Computing for Enterprise Architectures (Computer Communications and Networks)

Cloud Computing is emerging as a pervasive and consumer-driven utility that is attracting great interest from entrepreneurs, innovators and technology evangelists, as well as the ‘connected’ public at large. The shift from a focus upon IT, to a more assertive focus upon business, further strengthens the case for cloud adoption,...

Android NDK Beginner's Guide
Android NDK Beginner's Guide
The short history of computing machines has witnessed some major events, which forever transformed our usage of technology. From the first massive main frames to the democratization of personal computers, and then the interconnection of networks. Mobility is the next revolution. Like the primitive soup, all the ingredients are now...
Pattern Recognition: An Algorithmic Approach (Undergraduate Topics in Computer Science)
Pattern Recognition: An Algorithmic Approach (Undergraduate Topics in Computer Science)
Our main aim in writing this book is to make the concepts of pattern recognition clear to undergraduate and postgraduate students of the subject. We will not deal with pre-processing of data. Rather, assuming that patterns are represented using some appropriate pre-processing techniques in the form of vectors of numbers, we will...
iOS Hacker's Handbook
iOS Hacker's Handbook

Discover all the security risks and exploits that can threaten iOS-based mobile devices

iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS...

Algorithms: Sequential, Parallel, and Distributed
Algorithms: Sequential, Parallel, and Distributed
The objectives of this book are to provide a solid foundation for the classical the ory of sequential algorithms and to cover some of the most important recent al gorithmic developments, including the rapidly advancing theory of parallel and distributed algorithms. The book is intended to serve as a text for a core upper...
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy