Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
LR Parsing: Theory and Practice (Cambridge Studies in Cultural Systems)
LR Parsing: Theory and Practice (Cambridge Studies in Cultural Systems)

LR parsing has become a widely used method of syntax analysis; this is largely due to the availability of parser generators and compiler- compilers based on LR techniques. However, the readily available ac counts of the theory of these techniques are either superficial or are weighed down with tedious mathematical detail of a merely...

Inside Windows Debugging: A Practical Guide to Debugging and Tracing Strategies in Windows
Inside Windows Debugging: A Practical Guide to Debugging and Tracing Strategies in Windows
One exciting aspect of software programming is that there are usually many ways to accomplish the same goal. Unfortunately, this also presents software engineers with unique challenges when trying to make the best design or implementation choice for each situation. Experience plays a major role, and the learning...
Joomla! 1.5 JavaScript jQuery
Joomla! 1.5 JavaScript jQuery

Ever wondered how all the great-looking, feature packed, amazing Joomla! sites are made? Would you like to add image transitions, popups, scrolls, AJAX forms, image galleries, no-page reloads to your website, but are worried that they will be difficult to implement? To make any Joomla! site look more professional, interactive, and interesting...

Recommender Systems: An Introduction
Recommender Systems: An Introduction

“Which digital camera should I buy? What is the best holiday for me and my family? Which is the best investment for supporting the education of my children? Which movie should I rent? Which web sites will I find interesting? Which book should I buy for my next vacation? Which degree and university are the best for my...

Mining of Massive Datasets
Mining of Massive Datasets
This book evolved from material developed over several years by Anand Rajaraman and Jeff Ullman for a one-quarter course at Stanford. The course CS345A, titled “Web Mining,” was designed as an advanced graduate course, although it has become accessible and interesting to advanced undergraduates.

The popularity of...

Apache Hive Essentials
Apache Hive Essentials

Immerse yourself on a fantastic journey to discover the attributes of big data by using Hive

About This Book

  • Discover how Hive can coexist and work with other tools in the Hadoop ecosystem to create big data solutions
  • Grasp the skills needed, learn the best practices, and avoid the...
Upgrading Microsoft Visual Basic 6.0 to Microsoft Visual Basic .NET
Upgrading Microsoft Visual Basic 6.0 to Microsoft Visual Basic .NET

Many articles have appeared in the press about Visual Basic .NET being radically different from prior versions of Visual Basic. Unfortunately, most of the articles leave you with more questions than answers. What exactly are the changes in Visual Basic .NET? Will it be possible to upgrade existing applications? Why does it break...

Cloning Internet Applications with Ruby
Cloning Internet Applications with Ruby

Most users on the Internet have a few favorite Internet web applications that they use often and cannot do without. These popular applications often provide essential services that we need even while we don't fully understand its features or how they work. Ruby empowers you to develop your own clones of such applications without much...

Getting Started with Dwarf Fortress: Learn to play the most complex video game ever made
Getting Started with Dwarf Fortress: Learn to play the most complex video game ever made

Dwarf Fortress may be the most complex video game ever made, but all that detail makes for fascinating game play, as various elements collide in interesting and challenging ways. The trick is getting started. In this guide, Fortress geek Peter Tyson takes you through the basics of this menacing realm, and helps you overcome the...

Maximum Mac OS X Security
Maximum Mac OS X Security

While Mac OS X is becoming more and more stable with each release, its UNIX/BSD underpinnings have security implications that ordinary Mac users have never before been faced with. Mac OS X can be used as both a powerful Internet server, or, in the wrong hands, a very powerful attack launch point.

Yet most Mac OS X books are generally...

Personalized Digital Television: Targeting Programs to Individual Viewers
Personalized Digital Television: Targeting Programs to Individual Viewers
This book collects selected research reports on the development of personalized services for Interactive TV. Drawing upon contributions from academia and industry that represent current research in the US, Europe and Asia, these articles represent leading research in personalized television.

TV viewers today are exposed to overwhelming...

Dynamic Vision for Perception and Control of Motion
Dynamic Vision for Perception and Control of Motion
The application of machine vision to autonomous vehicles is an increasingly important area of research with exciting applications in industry, defense, and transportation likely in coming decades.

Dynamic Vision for Perception and Control of Road Vehicles has been written by the world's leading expert on autonomous road-following...

unlimited object storage image
Result Page: 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy