Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Eye Tracking Methodology: Theory and Practice
Eye Tracking Methodology: Theory and Practice
Despite the availability of cheap, fast, accurate and usable eye trackers, there is still little information available on how to develop, implement and use these systems. This second edition of Andrew Duchowski’s successful guide to these systems contains significant additional material on the topic and fills this gap in the market with this...
The Business and Culture of Digital Games: Gamework and Gameplay
The Business and Culture of Digital Games: Gamework and Gameplay
"Fusing digital technologies and cultural creativity, exploiting global networks of production and distribution with little regulation and embodying the liberal ideas of individual choice and agency, digital games seem to epitomize global post-industrial neo-liberal cultural products. Kerr finds reality a bit more complex. For all their...
Inventing Software: The Rise of Computer-Related Patents
Inventing Software: The Rise of Computer-Related Patents

Since the introduction of personal computers, software has emerged as a driving force in the global economy and a major industry in its own right. During this time, the U.S. government has reversed its prior policy against software patents and is now issuing thousands of such patents each year, provoking heated controversy among programmers,...

Ext.NET Web Application Development
Ext.NET Web Application Development
This book will show how to use Ext.NET 2 to create sophisticated and highly interactive web applications whether you use ASP.NET Web Forms or ASP.NET MVC. The chapters will go through setting up and exploring various controls that Ext.NET provides. It will look at the sophisticated AJAX and data-handling options available while...
Nmap 6: Network exploration and security auditing Cookbook
Nmap 6: Network exploration and security auditing Cookbook

Want to master Nmap and its scripting engine? Then this book is for you – packed with practical tasks and precise instructions, it's a comprehensive guide to penetration testing and network monitoring. Security in depth.

Overview

  • Master the power of Nmap 6
  • Learn how the...
Raspberry Pi Blueprints
Raspberry Pi Blueprints

Design and build your own hardware projects that interact with the real world using the Raspberry Pi

About This Book

  • Interact with a wide range of additional sensors and devices via Raspberry Pi
  • Create exciting, low-cost products ranging from radios to home security and weather...
Logic Synthesis for Compositional Microprogram Control Units (Lecture Notes in Electrical Engineering)
Logic Synthesis for Compositional Microprogram Control Units (Lecture Notes in Electrical Engineering)
The control unit is one of the most important parts of any digital system. As a rule, control units have an irregular structure, which makes the processing of their logic circuits design very sophisticated. One possible way to optimise such characteristics as the size or performance of control units is to adapt their structures to the particular...
A Dictionary of Real Numbers
A Dictionary of Real Numbers
How do we recognize that the number .93371663... is actually 21og1 0(e + 7r)/2 ? Gauss observed that the number 1.85407467... is (essentially) a rational value of an elliptic integral—an observation that was critical in the development of nineteenth century analysis. How do we decide that such a number is actually a special value of a...
Notes on Digital Signal Processing: Practical Recipes for Design, Analysis and Implementation
Notes on Digital Signal Processing: Practical Recipes for Design, Analysis and Implementation

Standard advice for writing a preface tells the author to begin by answering the question, “Why did you write this book?” The published answers almost always include an explanation of how something is still missing in the already vast body of existing literature, and how the book in question represents a valiant attempt to...

Semantic Web Services
Semantic Web Services

All students interested in researching the Internet are living in very interesting and exciting times. From the Internet’s beginning in the 1960s up to the present day, the Internet has grown to become a vast platform where there are now 2 billion users of this global infrastructure.1 Predictions are that this number will rise to...

Graphics with Mathematica: Fractals, Julia Sets, Patterns and Natural Forms
Graphics with Mathematica: Fractals, Julia Sets, Patterns and Natural Forms

In this book we generate graphic images using the software Mathematica thus providing a gentle and enjoyable introduction to this rather technical software and its graphic capabilities.
The programs we use for generating these graphics are easily adaptable to many variations.

These graphic images are enhanced by
...

Fundamentals of Probability: With Stochastic Processes
Fundamentals of Probability: With Stochastic Processes

"The 4th edition of Ghahramani's book is replete with intriguing historical notes, insightful comments, and well-selected examples/exercises that, together, capture much of the essence of probability. Along with its Companion Website, the book is suitable as a primary resource for a first course in probability. Moreover, it...

unlimited object storage image
Result Page: 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy