Home | Amazing | Today | Tags | Publishers | Years | Search 
Proceedings of the Second Conference on Artificial General Intelligence (Arlington, March 2009)
Proceedings of the Second Conference on Artificial General Intelligence (Arlington, March 2009)
Artificial General Intelligence (AGI) research focuses on the original and ultimate goal of AI – to create broad human-like and transhuman intelligence, by exploring all available paths, including theoretical and experimental computer science, cognitive science, neuroscience, and innovative interdisciplinary methodologies....
Decision Making Algorithms for Hydro-Power Plant Location (SpringerBriefs in Energy)
Decision Making Algorithms for Hydro-Power Plant Location (SpringerBriefs in Energy)

The present study has attempted to apply the advantage of neuro-genetic algorithms for optimal decision making in maximum utilization of natural resources. Hydro-power is one of the inexpensive, but a reliable source of alternative energy which is foreseen as the possible answer to the present crisis in the energy sector. However, the major...

Kernel Learning Algorithms for Face Recognition
Kernel Learning Algorithms for Face Recognition

Kernel Learning Algorithms for Face Recognition covers the framework of kernel based face recognition. This book discusses the advanced kernel learning algorithms and its application on face recognition. This book also focuses on the theoretical deviation, the system framework and experiments involving kernel based face recognition. Included...

One-of-a-Kind Production
One-of-a-Kind Production

Despite the numerous competitive advantages of one-of-a-kind production (OKP), the low efficiency and high costs associated with OKP companies threaten to push their business opportunities into the hands of cheaper overseas suppliers.

One-of-a-Kind Production introduces a novel strategy and technology to help OKP companies...

Pocket Data Mining: Big Data on Small Devices (Studies in Big Data)
Pocket Data Mining: Big Data on Small Devices (Studies in Big Data)

Owing to continuous advances in the computational power of handheld devices like smartphones and tablet computers, it has become possible to perform Big Data operations including modern data mining processes onboard these small devices. A decade of research has proved the feasibility of what has been termed as Mobile Data...

Optimization (Springer Texts in Statistics)
Optimization (Springer Texts in Statistics)

Finite-dimensional optimization problems occur throughout the mathematical sciences. The majority of these problems cannot be solved analytically. This introduction to optimization attempts to strike a balance between presentation of mathematical theory and development of numerical algorithms. Building on students’ skills in calculus...

Language Grounding in Robots
Language Grounding in Robots

Written by leading international experts, this volume presents contributions establishing the feasibility of human language-like communication with robots. The book explores the use of language games for structuring situated dialogues in which contextualized language communication and language acquisition can take place. Within the text are...

Fixed-Point Algorithms for Inverse Problems in Science and Engineering (Springer Optimization and Its Applications)
Fixed-Point Algorithms for Inverse Problems in Science and Engineering (Springer Optimization and Its Applications)

"Fixed-Point Algorithms for Inverse Problems in Science and Engineering" presents some of the most recent work from top-notch researchers studying projection and other first-order fixed-point algorithms in several areas of mathematics and the applied sciences. The material presented provides a survey of the state-of-the-art...

Cloud Standards: Agreements That Hold Together Clouds
Cloud Standards: Agreements That Hold Together Clouds

Cloud computing is often described as providing computing resources the way electric utilities provide energy. In theory, anyone with an adequate connection to the Internet should be able to tap into a cloud provider and get exactly the computing resources they want when they want it, just like plugging into the electricity grid and...

Prototyping: A Practitioner's Guide
Prototyping: A Practitioner's Guide
What’s the difference between theory and practice? Albert Einstein once said, “In theory they are the same. In practice, they are not.”

Practice makes perfect. Champion sports teams practice constantly. Zen masters will tell you that the only way to achieve enlightenment is practice.
...
Laser Space Communications
Laser Space Communications

Laser space communications is a hot topic among electrical engineers working for the government and in the defense industry, and this groundbreaking resource is the first to offer professionals a thorough, practical treatment of the subject. The book focuses on the feasibility of laser space communications between satellites, satellites and...

Efficient Secure Two-Party Protocols: Techniques and Constructions (Information Security and Cryptography)
Efficient Secure Two-Party Protocols: Techniques and Constructions (Information Security and Cryptography)

The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation – both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them...

Result Page: 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy