Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Topology-based Methods in Visualization (Mathematics and Visualization)
Topology-based Methods in Visualization (Mathematics and Visualization)
Enabling insight into large and complex datasets is a prevalent theme in visualization research for which different approaches are pursued.

Topology-based methods are built on the idea of abstracting characteristic structures such as the topological skeleton from the data and to construct the visualizations accordingly. There are currently new...

Fundamentals of Predictive Text Mining (Texts in Computer Science)
Fundamentals of Predictive Text Mining (Texts in Computer Science)

Five years ago, we authored “Text Mining: Predictive Methods for Analyzing Unstructured Information.” That book was geared mostly to professional practitioners, but was adaptable to course work with some effort by the instructor. Many topics were evolving, and this was one of the earliest efforts to collect material for predictive...

Efficient Algorithms for Listing Combinatorial Structures (Distinguished Dissertations in Computer Science)
Efficient Algorithms for Listing Combinatorial Structures (Distinguished Dissertations in Computer Science)

This thesis is concerned with the design of efficient algorithms for listing combinatorial structures. The research described here gives some answers to the following questions: which families of combinatorial structures have fast computer algorithms for listing their members, What general methods are useful for listing combinatorial...

Advances in Databases and Information Systems: 8th East European Conference, ADBIS 2004, Budapest
Advances in Databases and Information Systems: 8th East European Conference, ADBIS 2004, Budapest
This volume continues the series of proceedings of the annual ADBIS conferences in the field of advances in databases and information systems.

ADBIS, founded by the Moscow ACM SIGMOD Chapter, was extended into a regular East-European conference in 1996 to establish a forum for promoting interaction and
...
Spy the Lie: Former CIA Officers Teach You How to Detect Deception
Spy the Lie: Former CIA Officers Teach You How to Detect Deception

THE NEW YORK TIMES BESTSELLER

Three former CIA officers--among the world's foremost authorities on recognizing deceptive behavior--share their proven techniques for uncovering a lie

Imagine how different your life would be if you could tell whether someone was lying or telling you the truth.
...

Modeling the Internet and the Web: Probabilistic Methods and Algorithms
Modeling the Internet and the Web: Probabilistic Methods and Algorithms
The World Wide Web is growing in size at a remarkable rate.  It is a huge evolving system and its data are rife with uncertainties.  Probability and statistics are the fundamental mathematical tools that enable us to model, reason and infer meaningful results from such data.  Modelling the Internet and the Web covers the...
Check Point Next Generation Security Administration
Check Point Next Generation Security Administration
Check Point NG aims to teach its readers how to install and set up VPN-1/FireWall-1 Next Generation, the latest version of the highly respected firewall software from Check Point. Its authors--all with significant network and security certifications--accomplish their objective: it seems likely that this book will travel with a lot of Check...
Logics in Artificial Intelligence: 9th European Conference, JELIA 2004, Lisbon, Portugal, September 27-30, 2004
Logics in Artificial Intelligence: 9th European Conference, JELIA 2004, Lisbon, Portugal, September 27-30, 2004
This book constitutes the refereed proceedings of the 9th European Conference on Logics in Artificial Intelligence, JELIA 2004, held in Lisbon, Portugal, in September 2004.

The 52 revised full papers and 15 revised systems presentation papers presented together with the abstracts of 3 invited talks were carefully reviewed and selected from a...

The Evolution of Violence (Evolutionary Psychology)
The Evolution of Violence (Evolutionary Psychology)

This volume is an interdisciplinary exploration of our understanding of the causes and consequences of violence. Represented in its chapters are noted scholars from a variety of fields including psychology, anthropology, law, and literature. The contributions reflect a broad scope of inquiry and diverse levels of analysis. With an underlying...

Scheduling: Theory, Algorithms, and Systems
Scheduling: Theory, Algorithms, and Systems

This new edition provides an up-to-date coverage of important theoretical models in the scheduling literature as well as  significant scheduling problems that occur in the real world. It again includes supplementary  material in the form of  slide-shows from industry and movies that...

Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
Rule Based Expert Systems: The Mycin Experiments of the Stanford Heuristic Programming Project
Rule Based Expert Systems: The Mycin Experiments of the Stanford Heuristic Programming Project
The last seven years have seen the field of artificial intelligence (AI) transformed. This transformation is not simple, nor has it yet run its course. The transformation has been generated by the emergence of expert systems. Whatever exactly these are or turn out to be, they first arose during the 1970s, with a triple claim: to be AI systems that...
unlimited object storage image
Result Page: 211 210 209 208 207 206 205 204 203 202 201 200 199 198 197 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy