Home | Amazing | Today | Tags | Publishers | Years | Search 
Engineering Chemistry (as Per VTU)
Engineering Chemistry (as Per VTU)

The objective of this book is to present a substantial introduction to the ideas, phenomena and methods of the problems that are frequently observed in mathematics, mathematical physics and engineering technology. The book can be appreciated at a considerable number of levels and is designed for everyone from amateurs to research workmen.

...
Artificial General Intelligence: 4th International Conference, AGI 2011, Mountain View
Artificial General Intelligence: 4th International Conference, AGI 2011, Mountain View

The original goal of the AI field was the construction of “thinking machines” – that is, computer systems with human-like general intelligence. Due to the difficulty of this task, for the last few decades the majority of AI researchers have focused on what has been called “narrow AI” – the production...

Software Development and Professional Practice
Software Development and Professional Practice

What’s this book all about? Well, it’s about how to develop software, from a personal perspective. We’ll look at what it means for you to take a problem and produce a program to solve it from beginning to end. That said, this book focuses a lot on design. How do you design software? What things do you take into...

Human Centered Design: Second International Conference, HCD 2011, Held as Part of HCI International 2011
Human Centered Design: Second International Conference, HCD 2011, Held as Part of HCI International 2011

The 14th International Conference on Human–Computer Interaction, HCI International 2011, was held in Orlando, Florida, USA, July 9–14, 2011, jointly with the Symposium on Human Interface (Japan) 2011, the 9th International Conference on Engineering Psychology and Cognitive Ergonomics, the 6th International Conference on...

IPv6 Security
IPv6 Security

Internet Protocol version 6 (IPv6) is the next version of the protocol that is used for communications on the Internet. IPv6 is a protocol that has been in existence for many years, but it has not yet replaced IPv4. IPv4 has some limitations that were not anticipated when it was first created. Because IPv6 overcomes many of these...

Unconventional Computation: 10th International Conference, UC 2011, Turku, Finland, June 6-10
Unconventional Computation: 10th International Conference, UC 2011, Turku, Finland, June 6-10

The 10th International Conference on Unconventional Computation, UC 2011, was organized under the auspices of EATCS and Academia Europaea, by the Department of Mathematics of the University of Turku (Turku, Finland), and the Center for Discrete Mathematics and Theoretical Computer Science (Auckland, New Zealand). The event was held in...

Pro Android Python with SL4A
Pro Android Python with SL4A

This book is about writing real-world applications for the Android platform primarily using the Python language and a little bit of JavaScript. While there is nothing wrong with Java, it really is overkill when all you need to do is turn on or off a handful of settings on your Android device. The Scripting Layer for Android (SL4A)...

Redis Cookbook
Redis Cookbook

Redis is a data structure server with an in-memory dataset for speed. It is called a data structure server and not simply a key value store because Redis implements data structures allowing keys to contain binary safe strings, hashes, sets and sorted sets, as well as lists. This combination of flexibility and speed makes Redis the ideal tool...

Representations and Techniques for 3D Object Recognition & Scene Interpretation
Representations and Techniques for 3D Object Recognition & Scene Interpretation

3D scene understanding and object recognition are among the grandest challenges in computer vision. A wide variety of techniques and goals, such as structure from motion, optical flow, stereo, edge detection, and segmentation, could be viewed as subtasks within scene understanding and recognition. Many of these applicable methods are...

Systems and Software Verification: Model-Checking Techniques and Tools
Systems and Software Verification: Model-Checking Techniques and Tools

Model checking is a powerful approach for the formal verification of software. It automatically provides complete proofs of correctness, or explains, via counter-examples, why a system is not correct. Here, the author provides a well written and basic introduction to the new technique. The first part describes in simple terms the theoretical...

Programming Like a Pro for Teens
Programming Like a Pro for Teens

Are you ready to learn how to program a computer? You'll do just that in this book. PROGRAMMING LIKE A PRO FOR TEENS is written in a friendly, unassuming voice that makes it possible for you to master the ideas and concepts that professionals use for programming every day. You learn algorithmic thinking and problem-solving in addition to...

Security Strategy: From Requirements to Reality
Security Strategy: From Requirements to Reality

Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and...

Result Page: 768 767 766 765 764 763 762 761 760 759 758 757 756 755 754 753 752 751 750 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy