Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Semantic Multimedia and Ontologies: Theory and Applications
Semantic Multimedia and Ontologies: Theory and Applications
This book draws together experts from the multimedia, the knowledge and the integrated multimedia-knowledge domains to explore how knowledge technologies can be exploited to create new multimedia applications, and how multimedia technologies can provide new contexts for the use of knowledge technologies.

The step-by-step approach guides the...

Modelling Urban Development with Geographical Information Systems and Cellular Automata
Modelling Urban Development with Geographical Information Systems and Cellular Automata
Urban development and migration from rural to urban areas are impacting prime agricultural land and natural landscapes, particularly in the less developed countries. These phenomena will persist and require serious study by those monitoring global environmental change. To address this need, various models have been devised to analyze urbanization...
Python Text Processing with NLTK 2.0 Cookbook
Python Text Processing with NLTK 2.0 Cookbook

Natural Language Processing is used everywhere - in search engines, spell checkers, mobile phones, computer games - even your washing machine. Python's Natural Language Toolkit (NTLK) suite of libraries has rapidly emerged as one of the most efficient tools for Natural Language Processing. You want to employ nothing less than the best...

Exploratory Software Testing: Tips, Tricks, Tours, and Techniques to Guide Test Design
Exploratory Software Testing: Tips, Tricks, Tours, and Techniques to Guide Test Design

How to Find and Fix the Killer Software Bugs that Evade Conventional Testing

 

In Exploratory Software Testing, renowned software testing expert James Whittaker reveals the real causes of today’s most serious, well-hidden software...

Pro PHP Security
Pro PHP Security

The Internet is a dangerous place for applications. In fact, it is reasonable to say that you
couldn’t create a less secure system if you tried. It is anonymous, uncontrolled, always on,
and instantly accessible from anywhere. This is a world where every bad actor, cracker, script
kiddie, and scam artist is your
...

Real-Time Systems Development
Real-Time Systems Development
Real-time Systems Development is a text for computing students who want to understand more about the development of software for real-time applications, involving concurrent programming, multi-tasking, data i/o and embedded processors.

The book has been written to cover single semester final year undergraduate options or
...
Semantic Web For Dummies (Computer/Tech)
Semantic Web For Dummies (Computer/Tech)
The Semantic Web community has a distinct feeling of manifest destiny. Here in the early part of the 21st century, the Web is still in its infancy (less than 20 years old), and the scope of unsolved digital data challenges is simply enormous. To many in the software industry, myself included, it seems inevitable that the next great Web revolution...
Microsoft Expression Web 3 In Depth
Microsoft Expression Web 3 In Depth

Beyond the Basics…Beneath the Surface…In Depth

 

Microsoft Expression Web 3

 

Advice and techniques that you need to get the job done.

 

...
Knowledge and Computing: A Course on Computer Epistemology
Knowledge and Computing: A Course on Computer Epistemology

The result of the author's extensive practical experience: a decade in computer process control using large scale systems, another decade in machine pattern-recognition for vision systems, and nearly a decade dealing with artificial intelligence and expert systems. These real-life projects have taught Vamos a critical appreciation of, and...

Sams Teach Yourself Twitter in 10 Minutes
Sams Teach Yourself Twitter in 10 Minutes

Welcome to Twitter, the Social Networking site that was called “utterly devoid of any sort of merit” by New Zealand Herald’s Canvas Magazine, (June 6, 2009) in the same week it appeared on the cover of TIME Magazine as “a powerful form of communication” and “the future of American innovation.”...

Managed Code Rootkits: Hooking into Runtime Environments
Managed Code Rootkits: Hooking into Runtime Environments

We live in a world in which we can’t trust our computers. For example, how can we know for sure that our hardware manufacturer did not hide malicious code in the system’s microchip? Or that our freshly installed operating system does not contain backdoors created by a rogue developer from the OS development team?

...

Inside Windows Debugging: A Practical Guide to Debugging and Tracing Strategies in Windows
Inside Windows Debugging: A Practical Guide to Debugging and Tracing Strategies in Windows
One exciting aspect of software programming is that there are usually many ways to accomplish the same goal. Unfortunately, this also presents software engineers with unique challenges when trying to make the best design or implementation choice for each situation. Experience plays a major role, and the learning...
unlimited object storage image
Result Page: 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy