Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
System Parameter Identification: Information Criteria and Algorithms (Elsevier Insights)
System Parameter Identification: Information Criteria and Algorithms (Elsevier Insights)

Recently, criterion functions based on information theoretic measures (entropy, mutual information, information divergence) have attracted attention and become an emerging area of study in signal processing and system identification domain. This book presents a systematic framework for system identification and information processing,...

Spatial Audio Processing: MPEG Surround and Other Applications
Spatial Audio Processing: MPEG Surround and Other Applications

This book collects a wealth of information about spatial audio coding into one comprehensible volume. It is a thorough reference to the 3GPP and MPEG Parametric Stereo standards and the MPEG Surround multi-channel audio coding standard. It describes key developments in coding techniques, which is an important factor in the optimization of...

Communicating Data with Tableau
Communicating Data with Tableau

Go beyond spreadsheets and tables and design a data presentation that really makes an impact. This practical guide shows you how to use Tableau Software to convert raw data into compelling data visualizations that provide insight or allow viewers to explore the data for themselves.

Ideal for analysts, engineers,...

SAP HANA Starter
SAP HANA Starter

SAP HANA is SAP's in-memory database technology, and the focal point of their next generation strategy. Using column-based storage to provide highly compressed and rapidly accessed data, a SAP HANA application can be several hundred times faster than the same application on previous generation database technology.

SAP HANA...

Hacking: The Art of Exploitation, 2nd Edition
Hacking: The Art of Exploitation, 2nd Edition
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits,...

Parsing the Turing Test: Philosophical and Methodological Issues in the Quest for the Thinking Computer
Parsing the Turing Test: Philosophical and Methodological Issues in the Quest for the Thinking Computer
Parsing the Turing Test is a landmark exploration of both the philosophical and methodological issues surrounding the search for true artificial intelligence. Will computers and robots ever think and communicate the way humans do? When a computer crosses the threshold into self-consciousness, will it immediately jump into the Internet and create a...
The Image Processing Handbook, Third Edition
The Image Processing Handbook, Third Edition
Image Processing Handbook covers methods for two different purposes:

improving the visual appearance of images to a human viewer

preparing images for measurement of the features and structures present

The handbook presents an extensive collection of image processing tools, enabling the user of computer-based system to...

Payment System Technologies and Functions: Innovations and Developments
Payment System Technologies and Functions: Innovations and Developments

Payment systems are the indispensable infrastructure for financial markets and business activities. Every commercial trade and financial transaction is finalized only when the final settlement is made through a payment system. If operational failures would occur in a payment system, preventing smooth transfers of funds, national economies and...

PowerPivot for Business Intelligence Using Excel and SharePoint
PowerPivot for Business Intelligence Using Excel and SharePoint

PowerPivot comprises a set of technologies for easy access to data mining and business intelligence analysis from Microsoft Excel and SharePoint. Power users and developers alike can create sophisticated, online analytic processing (OLAP) solutions using PowerPivot for Excel, and then share those solutions with other users via PowerPivot for...

PowerPivot for the Data Analyst: Microsoft Excel 2010
PowerPivot for the Data Analyst: Microsoft Excel 2010

ANALYZE HUGE AMOUNTS OF BUSINESS DATA FASTER, MORE EASILY, AND MORE ACCURATELY!

Use Microsoft’s free PowerPivot add-in for Excel 2010 to analyze immense amounts of data from any source, perform state-of-the-art business analysis far more easily, and make better decisions in less...

Beginning Power BI with Excel 2013: Self-Service Business Intelligence Using Power Pivot, Power View, Power Query, and Power Map
Beginning Power BI with Excel 2013: Self-Service Business Intelligence Using Power Pivot, Power View, Power Query, and Power Map

Understanding your company’s data has never been easier than with Microsoft’s new Power BI package for Excel 2013. Consisting of four powerful tools—Power Pivot, Power View, Power Query and Power Maps—Power BI makes self-service business intelligence a reality for a wide range of users, bridging the traditional gap...

The Art of Intrusion : The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
The Art of Intrusion : The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
"Enter the hostile world of computer crime from the comfort of your own armchair. Mitnick presents ten compelling chapters, each the result of an interview with a real hacker about a real attack. A must-read for anyone with an interest in information security"
—Tom Parker, Computer Security Analyst and founder of Global
...
Result Page: 37 36 35 34 33 32 31 30 29 28 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy