Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Sigmaplot 2000: Programming Guide
Sigmaplot 2000: Programming Guide
The Programming Guide provides you with complete descriptions of SigmaPlot’s powerful math, data manipulation, regression, and curve fitting features. It also describes how to use SigmaPlot’s Interactive Development Environment (IDE) and Macro Recorder to automate and customize SigmaPlot tasks.

Transforms are sets of
...
Algorithmic Learning Theory: 15th International Conference, ALT 2004, Padova, Italy, October 2-5, 2004. Proceedings
Algorithmic Learning Theory: 15th International Conference, ALT 2004, Padova, Italy, October 2-5, 2004. Proceedings
This book constitutes the refereed proceedings of the 15th International Conference on Algorithmic Learning Theory, ALT 2004, held in Padova, Italy in October 2004.

The 29 revised full papers presented together with 5 invited papers and 3 tutorial summaries were carefully reviewed and selected from 91 submissions. The papers are organized in...

Digital Logic Design, Fourth Edition
Digital Logic Design, Fourth Edition
Brian Holdsworth's Digital Logic Design is a well established undergraduate text on digital systems - offering full coverage of the field for first and second year modules and HND units. It has also proved popular in industry as a reference text.

Clive Woods has fully revised the text to cover all the latest developments in the field
...
Artificial Intelligence: A Modern Approach (3rd Edition)
Artificial Intelligence: A Modern Approach (3rd Edition)

Artificial Intelligence (AI) is a big field, and this is a big book. We have tried to explore the full breadth of the field, which encompasses logic, probability, and continuous mathematics; perception, reasoning, learning, and action; and everything from microelectronic devices to robotic planetary explorers. The book is...

Pro PHP MVC
Pro PHP MVC

Model View Controller (MVC) is becoming the definitive architecture of website development frameworks due to the stability, extensibility and predictability it lends to development. It is not just the primary separation of database, business logic and interface components, but includes a wide range of considerations for building...

Soft Computing for Recognition based on Biometrics (Studies in Computational Intelligence)
Soft Computing for Recognition based on Biometrics (Studies in Computational Intelligence)
We describe in this book, bio-inspired models and applications of hybrid intelligent systems using soft computing techniques for image analysis and pattern recognition based on biometrics and other information sources. Soft Computing (SC) consists of several intelligent computing paradigms, including fuzzy logic, neural networks,...
Real-Time Systems: Scheduling, Analysis, and Verification
Real-Time Systems: Scheduling, Analysis, and Verification
This text is based on two rich sources: (1) materials in lecture notes I taught to senior and graduate-level computer science and electrical engineering students at Rice University and at the University of Houston, and (2) my research in the area of timing analysis and verification of real-time systems since the late 1980s,...
Learn Python the Hard Way: A Very Simple Introduction to the Terrifyingly Beautiful World of Computers and Code
Learn Python the Hard Way: A Very Simple Introduction to the Terrifyingly Beautiful World of Computers and Code

You Will Learn Python!

 

Zed Shaw has perfected the world's best system for learning Python. Follow it and you will succeed-just like the hundreds of thousands of beginners Zed has taught to date! You bring the discipline,...

Secure Your Node.js Web Application: Keep Attackers Out and Users Happy
Secure Your Node.js Web Application: Keep Attackers Out and Users Happy

Cyber-criminals have your web applications in their crosshairs. They search for and exploit common security mistakes in your web application to steal user data. Learn how you can secure your Node.js applications, database and web server to avoid these security holes. Discover the primary attack vectors against web applications, and implement...

Computer Fundamentals and Programming in C
Computer Fundamentals and Programming in C

It provides a thorough understanding of the subject and its applications. The book begins with an introduction to the basic features of a digital computer, number systems and binary arithmetic, Boolean algebra and logic gates, software, operating systems, and the internet. A major part of the book provides a detailed coverage of programming...

Computational Intelligence for Movement Sciences: Neural Networks and Other Emerging Techniques
Computational Intelligence for Movement Sciences: Neural Networks and Other Emerging Techniques
Recent years have seen many new developments in computational intelligence (CI) techniques and, consequently, this has led to an exponential increase in the number of applications in a variety of areas, including: engineering, finance, social and biomedical. In particular, CI techniques are increasingly being used in biomedical and human movement...
CompTIA Security+ All-in-One Exam Guide, Second Edition
CompTIA Security+ All-in-One Exam Guide, Second Edition

A CompTIA Security+ Exam Guide and An On-the-Job Reference--All-in-One

Get complete coverage of all the material included on the CompTIA Security+ exam inside this fully up-to-date, comprehensive resource. Written by network security experts, this authoritative exam guide features learning objectives at the beginning of...

unlimited object storage image
Result Page: 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy