 |
|
 Machine Learning for Hackers
To explain the perspective from which this book was written, it will be helpful to define
the terms machine learning and hackers.
What is machine learning? At the highest level of abstraction, we can think of machine
learning as a set of tools and methods that attempt to infer patterns and extract insight
from a record of the... |  |  Pro jQuery
At its heart, jQuery does something that sounds pretty dull: it lets you modify the contents of HTML
documents by manipulating the model that the browser creates when it processes the HTML (known as
DOM manipulation, as I’ll explain later). If you are reading this, you have probably already done some
DOM manipulation, either using... |  |  SQL and Relational Theory: How to Write Accurate SQL Code
This edition differs from its predecessor in a number of ways. The overall objective remains the same, of course—
using SQL relationally is still the emphasis—but the text has been revised throughout to reflect, among other things,
experience gained from teaching live seminars based on the first edition.
One... |
|
 |  |  Software and Systems Traceability
Software engineering is a pessimistic discipline. The glass is always half empty
rather than half full. Not surprising really, we are hardened to the grind of improving
quality, painstakingly testing and, never quite, eliminating bugs. Critical review is
of the essence. We know there is “no silver bullet”.
... |  |  Linear Programming: An Introduction with Applications
This book is aimed at freshman, sophomores, and juniors in college who
are even remotely interested in some of the current applications of
mathematics to the real world. The difficulty with most of the other linear
programming books on the market is that they are high end books, written
primarily in a fairly rigorous fashion... |
|
|
|
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |