Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Principles of Data Mining (Undergraduate Topics in Computer Science)
Principles of Data Mining (Undergraduate Topics in Computer Science)
Data Mining, the automatic extraction of implicit and potentially useful information from data, is increasingly used in commercial, scientific and other application areas.

This book explains and explores the principal techniques of Data Mining: for classification, generation of association rules and clustering. It is written for readers without...

Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure
Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure
Is “provisioning a web server in 5 minutes for $5” the most interesting thing about the cloud?

Those responsible for IT in their enterprise are quickly discovering that the cloud is a game-changing trend that offers a completely new methodology for service provision. The cloud not only lets you cut
...
Tidal Power: Harnessing Energy from Water Currents
Tidal Power: Harnessing Energy from Water Currents

As the global supply of conventional energy sources, such as fossil fuels, dwindles and becomes more and more expensive, unconventional and renewable sources of energy, such as power generation from water sources, is becoming more and more important.  Hydropower has been around for decades, but this book suggests new methods that are...

The Warren Buffett Way
The Warren Buffett Way

Warren Buffett is the most famous investor of all time and one of today’s most admired business leaders. He became a billionaire and investment sage by looking at companies as businesses rather than prices on a stock screen. The first two editions of The Warren Buffett Way gave investors their first in-depth look at the...

Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on ... (Smart Innovation, Systems and Technologies)
Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on ... (Smart Innovation, Systems and Technologies)

Advanced Computing, Networking and Informatics are three distinct and mutually exclusive disciplines of knowledge with no apparent sharing/overlap among them. However, their convergence is observed in many real world applications, including cyber-security, internet banking, healthcare, sensor networks, cognitive radio, pervasive computing...

Eric Hobsbawm: A Life in History
Eric Hobsbawm: A Life in History
Eric Hobsbawm's works have had a nearly incalculable effect across generations of readers and students, influencing more than the practice of history but also the perception of it. Born in Alexandria, Egypt, of second-generation British parents, Hobsbawm was orphaned at age fourteen in 1931. Living with an uncle in Berlin, he...
Advances in Mobile Radio Access Networks
Advances in Mobile Radio Access Networks
This book gives a comprehensive overview of the technologies for the advances of
mobile radio access networks. The topics covered include linear transmitters,
superconducting filters and cryogenic radio frequency (RF) front head, radio over
fiber, software radio base stations, mobile terminal positioning, high speed
downlink
...
A Unified Framework for Video Summarization, Browsing & Retrieval: with Applications to Consumer and Surveillance Video
A Unified Framework for Video Summarization, Browsing & Retrieval: with Applications to Consumer and Surveillance Video
Large volumes of video content can only be easily accessed by the use of rapid browsing and retrieval techniques. Constructing a video table of contents (ToC) and video highlights to enable end users to sift through all this data and find what they want, when they want are essential. This reference puts forth a unified framework to integrate these...
Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace
Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace

Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous "Great...

1001 Ways to Be Romantic: Author's Annotated Edition
1001 Ways to Be Romantic: Author's Annotated Edition

Illustrated with syndicated cartoons Relationships/Self-Help The classic book on creating romantic relationships includes the author's personal notes, funny comments and stories and insightful observations that are literally handwritten in the book's margins. The authors annotated text includes: --Suggestions for how to expand on...

Model-Based Development: Applications
Model-Based Development: Applications

A Proven Development Methodology That Delivers On the Promise of Model-Based Approaches

Software continues to become more and more complex, while software consumers’ expectations for performance, reliability, functionality, and speed-to-market are also growing exponentially. H. S. Lahman shows how...

A Culture of Purpose: How to Choose the Right People and Make the Right People Choose You
A Culture of Purpose: How to Choose the Right People and Make the Right People Choose You

How innovative leaders create meaningful cultures that attract and retain top talent

Building a culture of purpose is one of the greatest challenges facing modern leaders, as today's best minds are looking for meaning, not just jobs. More than any other single factor, cultures of purpose power winning organizations,...

unlimited object storage image
Result Page: 146 145 144 143 142 141 140 139 138 137 136 135 134 133 132 131 130 129 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy