Home | Amazing | Today | Tags | Publishers | Years | Search 
High-Level Data Fusion
High-Level Data Fusion
Master cutting-edge Level 2 fusion techniques that help you develop powerful situation assessment services with eye-popping capabilities and performance with this trail-blazing resource. The book explores object and situation fusion processes with an appropriate handling of uncertainties, and applies cutting-edge artificial intelligence and...
A Twist of the Wrist 2: The Basics of High-Performance Motorcycle Riding
A Twist of the Wrist 2: The Basics of High-Performance Motorcycle Riding
Straight facts about riding! A Twist of the Wrist, the acknowledged number one book on rider improvement for ten years straight, brought riders worldwide to a new understanding of vital riding skills. Uncovers and traces, action by action, the direct links between man and machine.

The thrill of motorcycle racing tugs at the
...
Mind Performance Projects for the Evil Genius: 19 Brain-Bending Bio Hacks
Mind Performance Projects for the Evil Genius: 19 Brain-Bending Bio Hacks

Have some evil fun inside your head!

This wickedly inventive guide offers 19 build-it-yourself projects featuring high-tech devices that can map, manipulate, and even improve the greatest computer on earth-the human brain. Every project inside Mind Performance Projects for the Evil Genius is perfectly safe and...

Research and Development in Intelligent Systems XXVI: Incorporating Applications and Innovations in Intelligent Systems XVII
Research and Development in Intelligent Systems XXVI: Incorporating Applications and Innovations in Intelligent Systems XVII

The papers in this volume are the refereed papers presented at AI-2009, the Twenty-ninth SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence, held in Cambridge in December 2009 in both the technical and the application streams.

They present new and innovative developments and applications,...

Cracked Media: The Sound of Malfunction
Cracked Media: The Sound of Malfunction
In a small warehouse gallery space in the center of Sydney a noise turntablist, Lucas Abela, stands over a stack of vinyl that is bolted to the rotary device of an industrial sewing machine. Instead of spinning the records at 33 or 45 revolutions per minute this “turntable” spins the records at up to 2,850 revolutions per minute. The...
Parallel Algorithm Derivation and Program Transformation
Parallel Algorithm Derivation and Program Transformation
Transformational programming and parallel computation are two emerging fields that may ultimately depend on each other for success. Perhaps because ad hoc programming on sequential machines is so straightforward, sequential programming methodology has had little impact outside the academic community, and transformational methodology has had little...
Grid Resource Management: On-demand Provisioning, Advance Reservation, and Capacity Planning of Grid Resources
Grid Resource Management: On-demand Provisioning, Advance Reservation, and Capacity Planning of Grid Resources

In a dynamic computing environment, such as the Grid, resource management plays a crucial role for making distributed resources available on-demand to anyone from anywhere at any time without undermining the resource autonomy; this becomes an art when dealing with heterogeneous resources distributed under multiple trust domains spanning across...

Why Does E=mc2?: (And Why Should We Care?)
Why Does E=mc2?: (And Why Should We Care?)

The most accessible, entertaining, and enlightening explanation of the best-known physics equation in the world, as rendered by two of today’s leading scientists.

Professor Brian Cox and Professor Jeff Forshaw go on a journey to the frontier of 21st century science to consider the real meaning behind the iconic sequence of...

The Code Book: How to Make It, Break It, Hack It, Crack It
The Code Book: How to Make It, Break It, Hack It, Crack It

It’s known as the science of secrecy. Cryptography: the encoding and decoding of private information. And it is history’s most fascinating story of intrigue and cunning. From Julius Caesar and his Caesar Cipher to the code used by Mary Queen of Scots and her conspiracy to the use of the Engima machine during the Second World War,...

Virtual Machines
Virtual Machines

This book offers a unique insight into the building of virtual machines for sequential, object-oriented and parallel languages, and uses comparisons of different VMs to provide actual, practical examples.

State transitions are used as a formal technique for the specification of virtual machines throughout and – in addition...

Panderer to Power: The Untold Story of How Alan Greenspan Enriched Wall Street and Left a Legacy of Recession
Panderer to Power: The Untold Story of How Alan Greenspan Enriched Wall Street and Left a Legacy of Recession

Praise For PANDERER TO POWER

“We all owe a great debt to Fred Sheehan. Fred demolishes the myth of Alan Greenspan’s omniscience, while revealing the dangerous credulity of those who set him on a pedestal above the rest of us. Panderer to Power will be invaluable in making the case for how we might...

Assembly Language Step-by-Step: Programming with Linux
Assembly Language Step-by-Step: Programming with Linux

The eagerly anticipated new edition of the bestselling introduction to x86 assembly language

The long-awaited third edition of this bestselling introduction to assembly language has been completely rewritten to focus on 32-bit protected-mode Linux and the free NASM assembler. Assembly is the fundamental language bridging human ideas and...

Result Page: 136 135 134 133 132 131 130 129 128 127 126 125 124 123 122 121 120 119 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy