Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Behavioral Biometrics: A Remote Access Approach
Behavioral Biometrics: A Remote Access Approach

With the advent of the internet as a medium for performing business transactions, the need for a secure communication channel has never been more paramount. The study of behavioral biometrics - the verification and/or identification of individuals based on the way they provide information to an authentication system - originated from the need...

Ancient Engineers' Inventions: Precursors of the Present (History of Mechanism and Machine Science)
Ancient Engineers' Inventions: Precursors of the Present (History of Mechanism and Machine Science)
This book describes inventions and designs of ancient engineers that are the precursors of the present. The ages mainly range from 300 B.C. to 1600 A.D. with some exceptions from before and after this period.

As for the very ancient ones, the book describes inventions (documented by archaeological finds mainly from Pompei, Ercolano and Stabia)...

Do the Math: Secrets, Lies, and Algebra
Do the Math: Secrets, Lies, and Algebra

Tess loves math because it's the one subject she can trust—there's always just one right answer, and it never changes. But then she starts algebra and is introduced to those pesky and mysterious variables, which seem to be everywhere in eighth grade. When even your friends and parents can be variables, how in the world do...

Handbook of Natural Language Processing, Second Edition
Handbook of Natural Language Processing, Second Edition

As the title of this book suggests, it is an update of the first edition of the Handbook of Natural Language Processing which was edited by Robert Dale, Hermann Moisl, and Harold Somers and published in the year 2000. The vigorous growth of new methods in Natural Language Processing (henceforth, NLP) since then, strongly suggested that...

Fuzzy Sets in Management, Economy & Marketing
Fuzzy Sets in Management, Economy & Marketing

The rapid changes that have taken place globally on the economic, social and business fronts characterized the 20th century. The magnitude of these changes has formed an extremely complex and unpredictable decision-making framework, which is difficult to model through traditional approaches. The main purpose of this book is to present the...

Apache Spark 2.x Cookbook: Cloud-ready recipes for analytics and data science
Apache Spark 2.x Cookbook: Cloud-ready recipes for analytics and data science

Key Features

  • This book contains recipes on how to use Apache Spark as a unified compute engine
  • Cover how to connect various source systems to Apache Spark
  • Covers various parts of machine learning including supervised/unsupervised learning & recommendation engines

Book...

Architects of Intelligence: The truth about AI from the people building it
Architects of Intelligence: The truth about AI from the people building it

Financial Times Best Books of the Year 2018

TechRepublic Top Books Every Techie Should Read

Book Description

How will AI evolve and what major innovations are on the horizon? What will its impact be on the job market, economy, and society? What is the path toward human-level...

The Influence of Technology on Social Network Analysis and Mining (Lecture Notes in Social Networks)
The Influence of Technology on Social Network Analysis and Mining (Lecture Notes in Social Networks)

The study of social networks was originated in social and business communities. In recent years, social network research has advanced significantly; the development of sophisticated techniques for Social Network Analysis and Mining (SNAM) has been highly influenced by the online social Web sites, email logs, phone logs and instant...

Don't Give Me That Attitude!: 24 Rude, Selfish, Insensitive Things Kids Do and How to Stop Them
Don't Give Me That Attitude!: 24 Rude, Selfish, Insensitive Things Kids Do and How to Stop Them
Does Your Child Have Attitude?
  • Does your kid never take no for an answer and demand things go his way?
  • Do her theatrics leave you drained at the end of the day?
  • Are you resorting to bribes and threats to get your kid to do chores?
  • Does he cheat, complain, or blame others for his...
Learning Red Hat LINUX: Guide to Red Hat LINUX for New Users
Learning Red Hat LINUX: Guide to Red Hat LINUX for New Users
Learning Red Hat Linux walks the reader through the process of installing, configuring, and using Red Hat Linux 6 and some of its most popular applications. Networking coverage includes essential local area network configuration, plus excellent coverage of Samba setup and the process of establishing a Point-to-Point Protocol (PPP)...
The Government Machine: A Revolutionary History of the Computer
The Government Machine: A Revolutionary History of the Computer
Sitting in the reading rooms of the Public Record Office in London, a historian is in the center of a museum of organization. Copies of the catalogue to the museum fill several walls (although these are now complemented by online versions). The catalogue lists are dominated by references to objects of one kind: the file. The file has in its...
Heuristic Search: Theory and Applications
Heuristic Search: Theory and Applications

Search has been vital to artificial intelligence from the very beginning as a core technique in problem solving. The authors present a thorough overview of heuristic search with a balance of discussion between theoretical analysis and efficient implementation and application to real-world problems. Current developments in search such as...

unlimited object storage image
Result Page: 129 128 127 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy