Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Global Networking, Communication and Culture: Conflict or Convergence?: Spread of ICT, Internet Governance, Superorganism Humanity and Global Culture (Studies in Systems, Decision and Control)
Global Networking, Communication and Culture: Conflict or Convergence?: Spread of ICT, Internet Governance, Superorganism Humanity and Global Culture (Studies in Systems, Decision and Control)
Pursuing an interdisciplinary approach, this book offers detailed insights into the empirical relationships between overall social key figures of states and cultures in the fields of information and communication technology (ICT) (digital divide/inequality), the economy, education and religion. Its goal is to bridge the ‘cultural...
Planning in Intelligent Systems: Aspects, Motivations, and Methods (Wiley Series on Intelligent Systems)
Planning in Intelligent Systems: Aspects, Motivations, and Methods (Wiley Series on Intelligent Systems)
The first comparative examination of planning paradigms

This text begins with the principle that the ability to anticipate and plan is an essential feature of intelligent systems, whether human or machine. It further assumes that better planning results in greater achievements. With these principles as a foundation, Planning in Intelligent...

Nagios Core Administration Cookbook
Nagios Core Administration Cookbook

Develop an integrated monitoring solution for virtually any kind of network

Overview

  • Monitor almost anything in a network.
  • Control notifications in your network by configuring Nagios Core.
  • Get a handle on best practices and time-saving configuration methods for a leaner...
Smart Intelligent Computing and Applications: Proceedings of the Second International Conference on SCI 2018, Volume 1 (Smart Innovation, Systems and Technologies, 104)
Smart Intelligent Computing and Applications: Proceedings of the Second International Conference on SCI 2018, Volume 1 (Smart Innovation, Systems and Technologies, 104)

The proceedings covers advanced and multi-disciplinary research on design of smart computing and informatics. The theme of the book broadly focuses on various innovation paradigms in system knowledge, intelligence and sustainability that may be applied to provide realistic solution to varied problems in society, environment and...

3D Face Processing: Modeling, Analysis and Synthesis (The International Series in Video Computing)
3D Face Processing: Modeling, Analysis and Synthesis (The International Series in Video Computing)
3D Face Processing: Modeling, Analysis and Synthesis introduces the frontiers of 3D face processing techniques. It reviews existing 3D face processing techniques, including techniques for 3D face geometry modeling; 3D face motion modeling; and 3D face motion tracking and animation. Then it discusses a unified framework for face...
Developing Multi-Agent Systems with JADE (Wiley Series in Agent Technology)
Developing Multi-Agent Systems with JADE (Wiley Series in Agent Technology)

Learn how to employ JADE to build multi-agent systems!

JADE (Java Agent DEvelopment framework) is a middleware for the development of applications, both in the mobile and fixed environment, based on the Peer-to-Peer intelligent autonomous agent approach. JADE enables developers to implement and...

Robots, Reasoning, and Reification
Robots, Reasoning, and Reification
Robots, Reasoning, and Reification focuses on a critical obstacle that is preventing the development of intelligent, autonomous robots: the gap between the ability to reason about the world and the ability to sense the world and translate that sensory data into a symbolic model.

This ability is what enables living systems to look at the world...

Brainware : Bio-Inspired Architecture and Its Hardware Implementation
Brainware : Bio-Inspired Architecture and Its Hardware Implementation

The human brain, the ultimate intelligent processor, can handle ambiguous and uncertain information adequately. The implementation of such a human-brain architecture and function is called "brainware". Brainware is a candidate for the new tool that will realize a human-friendly computer society. As one of the LSI implementations of...

Beginning AI Bot Frameworks: Getting Started with Bot Development
Beginning AI Bot Frameworks: Getting Started with Bot Development


Want to build your first AI bot but don't know where to start? This book provides a comprehensive look at all the major bot frameworks available. You'll learn the basics for each framework in one place and get a clear picture for which one is best for your needs.

Architecting Google Cloud Solutions: Learn to design robust and future-proof solutions with Google Cloud technologies
Architecting Google Cloud Solutions: Learn to design robust and future-proof solutions with Google Cloud technologies

Achieve your business goals and build highly available, scalable, and secure cloud infrastructure by designing robust and cost-effective solutions as a Google Cloud Architect.

Key Features

  • Gain hands-on experience in designing and managing high-performance cloud solutions
  • ...
Human - Computer Systems Interaction: Backgrounds and Applications 2: Part 2 (Advances in Intelligent and Soft Computing)
Human - Computer Systems Interaction: Backgrounds and Applications 2: Part 2 (Advances in Intelligent and Soft Computing)
It is demonstrated that spectral characteristics of steady-state visual evoked potentials (SSVEPs) in a brain-computer interface (SSVEP-based BCI) depend significantly on the stimulus parameters, such as color and frequency of its flashing light. We postulate these dependencies can be used to improve the BCI performance –...
Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats

Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to...

unlimited object storage image
Result Page: 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy