Home | Amazing | Today | Tags | Publishers | Years | Search 
Deep Reinforcement Learning Hands-On: Apply modern RL methods, with deep Q-networks, value iteration, policy gradients, TRPO, AlphaGo Zero and more
Deep Reinforcement Learning Hands-On: Apply modern RL methods, with deep Q-networks, value iteration, policy gradients, TRPO, AlphaGo Zero and more

This practical guide will teach you how deep learning (DL) can be used to solve complex real-world problems.

Key Features

  • Explore deep reinforcement learning (RL), from the first principles to the latest algorithms
  • Evaluate high-profile RL methods, including value...
Design Patterns in Java(TM) (Software Patterns Series)
Design Patterns in Java(TM) (Software Patterns Series)

DESIGN PATTERNS ARE class- and method-level solutions to common problems in object-oriented design. If you’re an intermediate-level Java programmer who wants to become advanced or an advancedlevel Java programmer who hasn’t yet studied design patterns, this book is for you.

Design Patterns in Java™ takes a...

Towards Dynamic Randomized Algorithms in Computational Geometry (Lecture Notes in Computer Science)
Towards Dynamic Randomized Algorithms in Computational Geometry (Lecture Notes in Computer Science)

Computational geometry concerns itself with designing and analyzing algorithms for solving geometric problems. The field has reached a high level of sophistication, and very complicated algorithms have been designed. However, it is also useful to develop more practical algorithms, so long as they are based on rigorous methods. One such method...

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

With the increasing focus on IT Security comes a higher demand for identity management in the modern business. This requires a flexible, scalable, and secure authentication method. Identity control is made mandatory by many public standards, such as PCI, and PKI is an essential component to set up authentication in many technologies,...

Chemical Graph Theory: Introduction and Fundamentals (Mathematical Chemistry, Vol 1)
Chemical Graph Theory: Introduction and Fundamentals (Mathematical Chemistry, Vol 1)

This volume presents the fundamentals of graph theory and then goes on to discuss specific chemical applications. Chapter 1 provides a historical setting for the current upsurge of interest in chemical graph theory. chapter 2 gives a full background of the basic ideas and mathematical formalism of graph theory and includes such chemically...

Oracle 11g R1/R2 Real Application Clusters Essentials
Oracle 11g R1/R2 Real Application Clusters Essentials

Oracle RAC or Real Application Clusters is a grid computing solution that allows multiple nodes (servers) in a clustered system to mount and open a single database that resides on shared disk storage. Should a single system (node) fail, the database service will still be available on the remaining nodes. Oracle RAC is an integral part of the...

Software Design for Six Sigma: A Roadmap for Excellence
Software Design for Six Sigma: A Roadmap for Excellence

Information technology (IT) quality engineering and quality improvement methods are constantly getting more attention from world corporate leaders, all levels of management, design engineers, and academia. This trend can be seen easily by the widespread of “Six Sigma” initiatives in many Fortune IT 500 companies. For a Six...

Graphical Models for Machine Learning and Digital Communication (Adaptive Computation and Machine Learning)
Graphical Models for Machine Learning and Digital Communication (Adaptive Computation and Machine Learning)

A variety of problems m machine learning and digital communication deal with complex but structured natural or artificial systems. Natural patterns mat we wish to automatically classify' are a consequence of a hierarchical causal physical process. Learning about the world m which we live requires mat we extract useful sensor)'...

Neural Networks and Their Applications
Neural Networks and Their Applications

Neural Networks started as an academic discipline over 50 years ago with the publication by McCulloch and Pitts of their famous result that any logical problem can be solved by a suitable network composed of so-called binary decision nodes. These are processors which make the simplest possible decision, that is, whether or not to respond to a...

Any Time, Anywhere Computing: Mobile Computing Concepts and Technology
Any Time, Anywhere Computing: Mobile Computing Concepts and Technology

Mobile communications have permeated the globe in both business and social cultures. In only a few short years, Japan alone has had more than ten million subscribers enter the mobile market. Such explosive popularity is an indication of a strong commercial demand for communications in both the tethered and tetherless environments.

...
Captured by the Light: The Essential Guide to Creating Extraordinary Wedding Photography
Captured by the Light: The Essential Guide to Creating Extraordinary Wedding Photography

IMAGINE THE ADVANTAGE YOU’D HAVE IF ONE OF THE WORLD’S TOP WEDDING SHOOTERS SHARED HIS SECRETS WITH YOU World-renowned wedding photographer, and one of the most widely acclaimed instructors in the industry today, David Ziser brings his no-nonsense, straight-to-the-point teaching style to a book that totally rewrites...

Fuzzy Surfaces in GIS and Geographical Analysis: Theory, Analytical Methods, Algorithms and Applications
Fuzzy Surfaces in GIS and Geographical Analysis: Theory, Analytical Methods, Algorithms and Applications

Surfaces are a central to geographical analysis. Their generation and manipulation are a key component of geographical information systems (GISs). However, geographical surface data is often not precise. When surfaces are used to model geographical entities, the data inherently contains uncertainty in terms of both position and attribute....

Result Page: 108 107 106 105 104 103 102 101 100 99 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy