|
|
|
|
Prolog Programming for Artificial IntelligenceThis best-selling guide to Prolog has been fully revised and extended to provide an even greater range of applications, enhancing its value as a stand-alone guide to Prolog, artificial intelligence, or AI programming. Ivan Bratko discusses natural language processing with grammar rules, planning, and machine learning. The coverage of... | | | | |
|
Experience XSI 4: The Official SOFTIMAGE | XSI 4 Guide to Character CreationXSI is the next generation in digital animation software. It was used to create some of the first realistic CG characters developed for film and it continues to be used by artists and animators worldwide in new and creative ways and in many different fields-from computer games to the film industry, from commercials to music videos. This official... | | Encyclopedia of Science Technology and EthicsThe Encyclopedia of Science, Technology, and Ethics has had multiple origins. It was when contributing an article on the philosophy of technology to the pioneering first edition of the Encyclopedia of Bioethics (1978), that I began to dream of a more general encyclopedic introduction to issues of technology and ethics. Inspired by the perspective... | | |
|
Organization Theory: A Libertarian PerspectiveThis book applies the economic principles of individualist anarchism, as developed in Studies in Mutualist Political Economy, to the study of the large organization. It integrates the insights of mainstream organization theory into that framework, along with those of more radical thinkers like Ivan Illich, Paul Goodman, and R.A. Wilson. Part... | | Cryptography and Coding: 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011
The 13th IMA Conference on Cryptography and Coding was held at the Lady
Margaret Hall, University of Oxford, UK, during December 12–15, 2011. This
event was a 25th anniversary celebration of the very successful biennial IMA
conference series. Traditionally, the conference has taken place at the Royal
Agricultural College,... | | MPLS and VPN Architectures, Vol. 2MPLS and VPN Architectures, Volume II, builds on the best-selling MPLS and VPN Architectures, Volume I (1-58705-002-1), from Cisco Press. Extending into more advanced topics and deployment architectures, Volume II provides readers with the necessary tools they need to deploy and maintain a secure, highly available VPN.
MPLS and VPN... |
|
|
|
Result Page: 3 2 1 |