Home | Amazing | Today | Tags | Publishers | Years | Search 
Natural Language Processing with Python
Natural Language Processing with Python
This book offers a highly accessible introduction to Natural Language Processing, the field that underpins a variety of language technologies, ranging from predictive text and email filtering to automatic summarization and translation. With Natural Language Processing with Python, you'll learn how to write Python programs to work with large...
Managing Web Service Quality: Measuring Outcomes and Effectiveness (Premier Reference Source)
Managing Web Service Quality: Measuring Outcomes and Effectiveness (Premier Reference Source)
Web services are increasingly important in information technology with the expansive growth of the Internet. As services proliferate in domains ranging from e-commerce to digital government, the need for tools and methods to measure and guide the achievement of quality outcomes is critical for organizations.

Managing Web Service...

Engineering Service Oriented Systems: A Model Driven Approach
Engineering Service Oriented Systems: A Model Driven Approach
Despite pressures of economic slowdown and the e-commerce bubble burst, moving towards e-services is a compelling necessity for todays organizations. Companies that are reluctant to adopt a service oriented architecture in their IT systems will be missing out on unprecedented opportunities to create business value with relatively small IT...
Amphibionics : Build Your Own Biologically Inspired Reptilian Robot
Amphibionics : Build Your Own Biologically Inspired Reptilian Robot
This work provides the hobbyist with detailed mechanical, electronic, and PIC microcontroller knowledge needed to build and program a snake, frog, turtle, and alligator robots. It focuses on the construction of each robot in detail, and then explores the world of slithering, jumping, swimming, and walking robots, and the artificial intelligence...
Security in Wireless Ad Hoc and Sensor Networks
Security in Wireless Ad Hoc and Sensor Networks
This book provides an in-depth guide to security in wireless ad hoc and sensor networks

Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security. It discusses the security attacks and...

A Distributed Pi-Calculus
A Distributed Pi-Calculus
Distributed systems are fast becoming the norm in computer science. Formal mathematical models and theories of distributed behavior are needed in order to understand them. This book proposes a distributed pi-calculus called Dpi, for describing the behavior of mobile agents in a distributed world. It is based on an existing formal language, the...
Ubiquitous and Pervasive Knowledge and Learning Management: Semantics, Social Networking and New Media to Their Full Potential
Ubiquitous and Pervasive Knowledge and Learning Management: Semantics, Social Networking and New Media to Their Full Potential
The importance of semantics has been recognized in different areas of data and information management, including better access, exchange, interoperability, integration, and analysis of data. Semantics of data is about associating meaning to data, understanding what data represents, and improving the value of data. Ubiquitous and Pervasive...
OS X Exploits and Defense
OS X Exploits and Defense
Long believed to be a sanctuary of computer security, the Macintosh OS X operating system is increasingly under fire, making it as vulnerable to attack as Windows or Linux operating systems.

Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an
...
Strategies for Information Technology and Intellectual Capital
Strategies for Information Technology and Intellectual Capital
"Due to the increasing importance of the intangible assets of a company, firms are now concerned with how best to manage and measure knowledge and other intangibles. In addition to this, information technology has drastically changed the way these measurements are managed. Strategies for Information Technology and Intellectual Capital:...
Pattern Recognition, Second Edition
Pattern Recognition, Second Edition
Pattern recognition is becoming increasingly important in the age of automation and information handling and retrieval.
This book provides the most comprehensive treatment available of pattern recognition, from an engineering perspective. Developed through more than ten years of teaching experience, Pattern Recognition is appropriate for both
...
Technology Enhanced Learning: Best Practices (Knowledge and Learning Society Books)
Technology Enhanced Learning: Best Practices (Knowledge and Learning Society Books)
With the shift towards the knowledge society, the change of working conditions, and the high-speed evolution of information and communication technologies, peoples' knowledge and skills need continuous updating. Learning based on collaborative working, creativity, multidisciplinarity, adaptiveness, intercultural communication, and problem solving...
Local Area Network Management, Design & Security
Local Area Network Management, Design & Security
Most workplaces rely on local area networks (LANs) to connect their computers and the right LAN is increasingly important in promoting effective communication both within the organisation and with the world at large.

Local Area Network Management, Design and Security is a practical and thorough introduction to managing and
...
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy