 |
|
 Natural Language Processing with PythonThis book offers a highly accessible introduction to Natural Language Processing, the field that underpins a variety of language technologies, ranging from predictive text and email filtering to automatic summarization and translation. With Natural Language Processing with Python, you'll learn how to write Python programs to work with large... |  |  |  |  Engineering Service Oriented Systems: A Model Driven ApproachDespite pressures of economic slowdown and the e-commerce bubble burst, moving towards e-services is a compelling necessity for todays organizations. Companies that are reluctant to adopt a service oriented architecture in their IT systems will be missing out on unprecedented opportunities to create business value with relatively small IT... |
|
 Amphibionics : Build Your Own Biologically Inspired Reptilian RobotThis work provides the hobbyist with detailed mechanical, electronic, and PIC microcontroller knowledge needed to build and program a snake, frog, turtle, and alligator robots. It focuses on the construction of each robot in detail, and then explores the world of slithering, jumping, swimming, and walking robots, and the artificial intelligence... |  |  Security in Wireless Ad Hoc and Sensor NetworksThis book provides an in-depth guide to security in wireless ad hoc and sensor networks
Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security. It discusses the security attacks and... |  |  A Distributed Pi-CalculusDistributed systems are fast becoming the norm in computer science. Formal mathematical models and theories of distributed behavior are needed in order to understand them. This book proposes a distributed pi-calculus called Dpi, for describing the behavior of mobile agents in a distributed world. It is based on an existing formal language, the... |
|
 |  |  OS X Exploits and DefenseLong believed to be a sanctuary of computer security, the Macintosh OS X operating system is increasingly under fire, making it as vulnerable to attack as Windows or Linux operating systems.
Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an... |  |  Strategies for Information Technology and Intellectual Capital"Due to the increasing importance of the intangible assets of a company, firms are now concerned with how best to manage and measure knowledge and other intangibles. In addition to this, information technology has drastically changed the way these measurements are managed. Strategies for Information Technology and Intellectual Capital:... |
|
 Pattern Recognition, Second EditionPattern recognition is becoming increasingly important in the age of automation and information handling and retrieval. This book provides the most comprehensive treatment available of pattern recognition, from an engineering perspective. Developed through more than ten years of teaching experience, Pattern Recognition is appropriate for both... |  |  Technology Enhanced Learning: Best Practices (Knowledge and Learning Society Books)With the shift towards the knowledge society, the change of working conditions, and the high-speed evolution of information and communication technologies, peoples' knowledge and skills need continuous updating. Learning based on collaborative working, creativity, multidisciplinarity, adaptiveness, intercultural communication, and problem solving... |  |  Local Area Network Management, Design & SecurityMost workplaces rely on local area networks (LANs) to connect their computers and the right LAN is increasingly important in promoting effective communication both within the organisation and with the world at large. Local Area Network Management, Design and Security is a practical and thorough introduction to managing and... |
|
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 |