Home | Amazing | Today | Tags | Publishers | Years | Search 
Hierarchical Neural Networks for Image Interpretation (Lecture Notes in Computer Science)
Hierarchical Neural Networks for Image Interpretation (Lecture Notes in Computer Science)

It is my pleasure and privilege to write the foreword for this book, whose results I have been following and awaiting for the last few years. This monograph represents the outcome of an ambitious project oriented towards advancing our knowledge of the way the human visual system processes images, and about the way it combines high...

jQuery UI 1.8: The User Interface Library for jQuery
jQuery UI 1.8: The User Interface Library for jQuery

Modern web application user interface design requires rapid development and proven results. jQuery UI, a trusted suite of official plugins for the jQuery JavaScript library, gives you a solid platform on which you can build rich and engaging interfaces with maximum compatibility, stability, and a minimum of time and effort.

jQuery...

IPv6 Security
IPv6 Security

Internet Protocol version 6 (IPv6) is the next version of the protocol that is used for communications on the Internet. IPv6 is a protocol that has been in existence for many years, but it has not yet replaced IPv4. IPv4 has some limitations that were not anticipated when it was first created. Because IPv6 overcomes many of these...

Implementing and Developing Cloud Computing Applications
Implementing and Developing Cloud Computing Applications

I was first exposed to what would become the Internet way back in 1969, while I was still an undergraduate at Brandeis University working on ARPANet, the forerunner to the present Internet, which operated at the then blazing speed of 2,400 bps, ultimately increased to 50 Kbps (see http://www.computerhistory.org/internet_history/). I...

Hibernation (Greenwood Guides to the Animal World)
Hibernation (Greenwood Guides to the Animal World)

There are many examples of the amazing evolutionary adaptations in the animal kingdom that aid survival, but the ability of animals to hibernate is one of the most incredible. Most vertebrates must keep warm, because hypothermia or loss of body heat is potentially fatal, but some have evolved to withstand a massive drop in...

Hacking exposed web applications, 3rd Edition
Hacking exposed web applications, 3rd Edition

There is no escaping the reality that businesses live on the Web today. From banks to bookstores, from auctions to games, the Web is the place where most businesses ply their trade. For consumers, the Web has become the place where they do the majority of their business as well. For example, nearly 50 percent of all retail music sales in the...

Web2py Enterprise Web Framework, 2nd Ed
Web2py Enterprise Web Framework, 2nd Ed

I am guilty! After publicly complaining about the existence of too many Python based web frameworks, after praising the merits of Django, Pylons, TurboGears, CherryPy, and web.py, after having used them professionally and taught them in University level courses, I could not resist and created one more: web2py.

Why did I...

Computer Organization, Design, and Architecture, Fourth Edition
Computer Organization, Design, and Architecture, Fourth Edition

This book covers the organization, design, and architecture of computers. Architecture is the ‘‘art or science of building; a method or style of building,’’ according to Webster’s. A computer architect develops the functional and performance specifications for the various blocks of a computer system and...

Color Imaging: Fundamentals and Applications
Color Imaging: Fundamentals and Applications

Color is one of the most fascinating areas to study. Color forms an integral part of nature, and we humans are exposed to it every day. We all have an intuitive understanding of what color is, but by studying the underlying physics, chemistry, optics, and human visual perception, the true beauty and complexity of color can be...

Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

The Last Days of Las Vegas
The Last Days of Las Vegas
"The Last Days of Las Vegas" has been provided by its author, Roy Hayes, especially for PDFCHM.

“Cryptic as they come, with layers of mystery unfolding gradually, this new spy thriller is really something different: a chess puzzle that teases and  entices you on, with loads of action and appropriate amounts of sex.
...
Designing Steel Structures for Fire Safety
Designing Steel Structures for Fire Safety

Structural design in fire conditions is conceptually similar to structural design in normal temperature conditions, but often more difficult because of internal forces induced by thermal expansion, strength reduction due to elevated temperatures, much larger deflections, and numerous other factors. Before making any design decisions it is...

Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy