Home | Amazing | Today | Tags | Publishers | Years | Search 
With Alexander in India and Central Asia: Moving East and Back to West
With Alexander in India and Central Asia: Moving East and Back to West

Alexander conquered most parts of the Western World, but there is a great deal of controversy over his invasion of India, the least known of his campaigns. In BC 327 Alexander came to India, and tried to cross the Jhelum river for the invasion, but was then confronted by King Porus who ruled an area in what is now the Punjab. According to...

Internet Psychology (The Basics)
Internet Psychology (The Basics)

We can't imagine our lives without the Internet. It is the tool of our existence; without it we couldn't work, plan our social and leisure activities, and interact with friends. The Internet’s influence on contemporary society extends across every aspect of our personal and professional lives, but how has this altered us in...

Computer Age Statistical Inference: Algorithms, Evidence, and Data Science (Institute of Mathematical Statistics Monographs)
Computer Age Statistical Inference: Algorithms, Evidence, and Data Science (Institute of Mathematical Statistics Monographs)
The twenty-first century has seen a breathtaking expansion of statistical methodology, both in scope and in influence. “Big data,” “data science,” and “machine learning” have become familiar terms in the news, as statistical methods are brought to bear upon the enormous data sets of modern science...
Software Testing 2020
Software Testing 2020

Software testing is at a very important crossroad, where it is going back to the roots on certain fronts while moving inexorably forward. For instance, test automation is growing in prominence, but manual testing is becoming a niche; we are increasingly collaborating with the developers, breaking the bounds of unrealistic...

Reasoning with Probabilistic and Deterministic Graphical Models: Exact Algorithms (Synthesis Lectures on Artificial Intelligence and Machine Learning)
Reasoning with Probabilistic and Deterministic Graphical Models: Exact Algorithms (Synthesis Lectures on Artificial Intelligence and Machine Learning)

Graphical models (e.g., Bayesian and constraint networks, influence diagrams, and Markov decision processes) have become a central paradigm for knowledge representation and reasoning in both artificial intelligence and computer science in general. These models are used to perform many reasoning tasks, such as scheduling, planning and...

The Art of Computer Programming, Volume 4, Fascicle 2: Generating All Tuples and Permutations
The Art of Computer Programming, Volume 4, Fascicle 2: Generating All Tuples and Permutations

Finally, after a wait of more than thirty-five years, the first part of Volume 4 is at last ready for publication. Check out the boxed set that brings together Volumes 1 - 4A in one elegant case, and offers the purchaser a $50 discount off the price of buying the four volumes individually.

Data Analysis and Pattern Recognition in Multiple Databases (Intelligent Systems Reference Library)
Data Analysis and Pattern Recognition in Multiple Databases (Intelligent Systems Reference Library)

Pattern recognition in data is a well known classical problem that falls under the ambit of data analysis. As we need to handle different data, the nature of patterns, their recognition and the types of data analyses are bound to change. Since the number of data collection channels increases in the recent time and becomes more...

Business Case Analysis with R: Simulation Tutorials to Support Complex Business Decisions
Business Case Analysis with R: Simulation Tutorials to Support Complex Business Decisions

This tutorial teaches you how to use the statistical programming language R to develop a business case simulation and analysis. It presents a methodology for conducting business case analysis that minimizes decision delay by focusing stakeholders on what matters most and suggests pathways for minimizing the risk in strategic and...

Managing Mission - Critical Domains and DNS: Demystifying nameservers, DNS, and domain names
Managing Mission - Critical Domains and DNS: Demystifying nameservers, DNS, and domain names

This book will give you an all encompassing view of the domain name ecosystem combined with a comprehensive set of operations strategies.

Key Features

  • Manage infrastructure, risk, and management of DNS name servers. Get hands-on with factors like types of name servers, DNS queries and and...
Veracity of Big Data: Machine Learning and Other Approaches to Verifying Truthfulness
Veracity of Big Data: Machine Learning and Other Approaches to Verifying Truthfulness
Examine the problem of maintaining the quality of big data and discover novel solutions. You will learn the four V’s of big data, including veracity, and study the problem from various angles. The solutions discussed are drawn from diverse areas of engineering and math, including machine learning, statistics, formal methods, and...
Startup Cities: Why Only a Few Cities Dominate the Global Startup Scene and What the Rest Should Do About It
Startup Cities: Why Only a Few Cities Dominate the Global Startup Scene and What the Rest Should Do About It
This book offers a comprehensive model for explaining the success and failure of cities in nurturing startups, presents detailed case studies of how participants in that model help or hinder startup activity, and shows how to apply these lessons to boost local startup activity.

Startup Cities explains the...

Data versus Democracy: How Big Data Algorithms Shape Opinions and Alter the Course of History
Data versus Democracy: How Big Data Algorithms Shape Opinions and Alter the Course of History
Human attention is in the highest demand it has ever been. The drastic increase in available information has compelled individuals to find a way to sift through the media that is literally at their fingertips. Content recommendation systems have emerged as the technological solution to this...
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy