Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Machine Translation (Neural Information Processing)
Learning Machine Translation (Neural Information Processing)
The Internet gives us access to a wealth of information in languages we don't understand. The investigation of automated or semi-automated approaches to translation has become a thriving research field with enormous commercial potential. This volume investigates how machine learning techniques can improve statistical machine translation, currently...
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

Short Message Service (SMS): The Creation of Personal Global Text Messaging
Short Message Service (SMS): The Creation of Personal Global Text Messaging

SMS is an incredible global success. At the time of writing (mid-2009) it can be used by all 4 billion GSM customers. More than 50 short messages are generated per month per GSM user. The service has created a $100 billion turnover industry. This success has been enabled mainly by the comprehensive and robust standards that have been made...

The Confident Student (Available Titles Coursemate)
The Confident Student (Available Titles Coursemate)

Thank you for choosing Th e Confi dent Student, Seventh Edition. Th is book is special for several reasons. It has grown with the times to refl ect pedagogical changes, technological advancements, and students’ needs. Yet Th e Confi dent Student’s core values of individual responsibility and confi dence through accomplishment...

Computer Security in the 21st Century
Computer Security in the 21st Century

Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.

Highlights include...

Introductory Nuclear Physics
Introductory Nuclear Physics
In the half dozen years or so since the first publication of Introductory Nuclear Physics, there have been several new developments and changes in the emphasis in the field. This, together with the enthusiastic feedback from colleagues and students, makes it imperative to publish a new edition.

For an active topic of research, a textbook
...
Biomedical Materials
Biomedical Materials

Biomedical Materials provides a comprehensive discussion of contemporary biomaterials research and development. Highlighting important topics associated with Engineering, Medicine and Surgery, this volume reaches a wide scope of professionals, researchers and graduate students involved with biomaterials. A pedagogical writing...

Mission Critical Windows 2000 Server Administration
Mission Critical Windows 2000 Server Administration
To put it in terms understandable to the many former English majors who now manage Windows networks: if Everyman were a system administrator, he'd run Windows 2000 Server. It supports pretty much any business requirement, yet it's user-friendly enough that anyone can learn to be an administrator with a bit of study. Mission Critical! Windows...
Computational Methods for Three-Dimensional Microscopy Reconstruction (Applied and Numerical Harmonic Analysis)
Computational Methods for Three-Dimensional Microscopy Reconstruction (Applied and Numerical Harmonic Analysis)

Approaches to the recovery of three-dimensional information on a biological object, which are often formulated or implemented initially in an intuitive way, are concisely described here based on physical models of the object and the image-formation process. Both three-dimensional electron microscopy and X-ray tomography can be captured in the...

The All-New Switch Book: The Complete Guide to LAN Switching Technology
The All-New Switch Book: The Complete Guide to LAN Switching Technology
The much-anticipated update to the bestselling book on LAN switching

Since the publication of the first edition of The Switch Book seven years ago, LAN switching has witnessed significant changes, particularly in the areas of network layers, Ethernet, fast Ethernet, segmenting LANs, layer 3 switching, layer 4 switching, and multi-layer...

Nuendo Power!
Nuendo Power!
Whether you are a musician, recording engineer, sound designer, video editor, or other type of
media author, certainly you have noticed that the demands of audio production in today’s multimedia
environment have increased dramatically. With the proliferation of surround sound systems in theaters,
homes, and specialized
...
Knots and Links
Knots and Links
Knot theory is the study of embeddings of circles in space. It is a subject in which naturally occurring questions are often so simple to state that they can be explained to a child, yet finding answers may require ideas from the forefront of research. It is a subject of both depth and subtlety.

The subject started to develop
...
Result Page: 15 14 13 12 11 10 9 8 7 6 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy