Home | Amazing | Today | Tags | Publishers | Years | Search 
Logic-Based Artificial Intelligence
Logic-Based Artificial Intelligence

This landmark volume represents the culmination of over 40 years of research in the use of logic as a basis for representing and manipulating problems in the field of artificial intelligence. The use of logic as a basis for commonsense reasoning was started by John McCarthy in 1959. The collection consists of both original research and...

Social Web Evolution: Integrating Semantic Applications and Web 2.0 Technologies
Social Web Evolution: Integrating Semantic Applications and Web 2.0 Technologies

As semantic technologies prove their value with targeted applications, there are increasing opportunities to consider their application in social contexts for knowledge, learning, and human development.

Semantic Web and Knowledge Management has been accepted as a critical enabler aiming to increase knowledge-related performance...

Modelling Enterprise Architectures (Iet Professional Applications of Computing Series)
Modelling Enterprise Architectures (Iet Professional Applications of Computing Series)

The world of business and commerce is changing. As technology advances at a rate of knots and the geography of global working becomes less and less relevant, so the need to run an effective business becomes more and more important. Businesses grow at an alarming rate, often overnight. Interest in particular field can explode resulting...

Programming Amazon EC2
Programming Amazon EC2

Thank you for picking up a copy of this book. Amazon Web Services (AWS) has amazed everyone: Amazon has made lots of friends, and all its “enemies” are too busy admiring AWS to do much fighting back. At the moment, there is no comparable public Infrastructure as a Service (IaaS); AWS offers the services at a scale that has...

Encyclopedia of Cryptology
Encyclopedia of Cryptology

Secret writing for the transmission of messages has been practiced for nearly 4,000 years. According to David Kahn, the great historian of cryptology, the first example of an intentionally altered message can be traced to a tomb in ancient Egypt dated about 1900 b.c. In the 40 centuries since that...

The Elements of MATLAB Style
The Elements of MATLAB Style

In 2002, I wrote a brief set of observations and thoughts on MATLAB style for my coworkers. Other programmers found it useful, so I posted the “MATLAB Programming Style Guidelines” document on my website datatool.com. It has since been downloaded more than 40,000 times.

This book responds to that encouraging...

Using iTunes 10
Using iTunes 10

For 10 years, iTunes has brought listening pleasure to people’s computers. Originally introduced in January 2001, the first version of iTunes worked only with Mac OS 9 operating systems, but later that year, Apple added support for OS X and for iPods—and that’s when iTunes really took off. Subsequent versions of the...

Beyond Bullet Points: Using Microsoft PowerPoint to Create Presentations that Inform, Motivate, and Inspire
Beyond Bullet Points: Using Microsoft PowerPoint to Create Presentations that Inform, Motivate, and Inspire

Unlock the amazing story buried in your presentation—and forget boring, bullet-point-riddled slides forever! Guided by communications expert Cliff Atkinson, you’ll walk you through an innovative, three-step methodology for increasing the impact of your presentation. Discover how to combine classic storytelling techniques...

Fundamentals of Predictive Text Mining (Texts in Computer Science)
Fundamentals of Predictive Text Mining (Texts in Computer Science)

Five years ago, we authored “Text Mining: Predictive Methods for Analyzing Unstructured Information.” That book was geared mostly to professional practitioners, but was adaptable to course work with some effort by the instructor. Many topics were evolving, and this was one of the earliest efforts to collect material for predictive...

Selected Areas in Cryptography: 9th Annual International Workshop, SAC 2002
Selected Areas in Cryptography: 9th Annual International Workshop, SAC 2002

SAC 2002 was the Ninth Annual Workshop on Selected Areas in Cryptography. Previous workshops have been held at Queen’s University in Kingston (1994, 1996, 1998, and 1999), Carleton University in Ottawa (1995 and 1997), University of Waterloo (2000), and the Fields Institute in Toronto (2001). The intent of the workshop is to provide a...

Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems
Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems

As depicted in David Lodge’s celebrated novel Small World, the perceived size of our world experienced a progressive decrease as jet airplanes became affordable to ever greater shares of the earth’s population. Yet, the really dramatic shrinking had to wait until the mid-1990s, when Internet became widespread and the information...

Android Application Development For Dummies
Android Application Development For Dummies

Welcome to Android Application Development For Dummies, the first For Dummies book that covers Android application development. When I was contacted to write this book, I was ecstatic about the opportunity to spread the wealth of knowledge that I’d picked up over the past year and a half of Android development. I hope you enjoy...

Result Page: 179 178 177 176 175 174 173 172 171 170 169 168 167 166 165 164 163 162 161 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy