Home | Amazing | Today | Tags | Publishers | Years | Search 
Data Mining in Finance: Advances in Relational and Hybrid Methods
Data Mining in Finance: Advances in Relational and Hybrid Methods

Data Mining in Finance presents a comprehensive overview of major algorithmic approaches to predictive data mining, including statistical, neural networks, ruled-based, decision-tree, and fuzzy-logic methods, and then examines the suitability of these approaches to financial data mining. The book focuses specifically on relational data mining...

Ordering Disorder: Grid Principles for Web Design (Voices That Matter)
Ordering Disorder: Grid Principles for Web Design (Voices That Matter)

At some level, design can be seen as a method of using creativity to impose tyranny on the world. Not tyranny in its classical sense, but rather tyranny on a much more modest, much more personal scale.

In the progression from problem to idea to solution, the designer may describe what she does in commercial terms (business...

Concurrency: State Models & Java Programs
Concurrency: State Models & Java Programs

Concurrent Programs are notoriously difficult to get right. This book provides a systematic and practical approach to designing, analyzing and implementing concurrent programs. Concurrency concepts and techniques are introduced and illustrated using both state models and Java programs. The design models enable concurrent behavior to be...

Sams Teach Yourself Visual C# 2010 in 24 Hours: Complete Starter Kit
Sams Teach Yourself Visual C# 2010 in 24 Hours: Complete Starter Kit

Over a decade ago, a small team of designers met in a small conference room on the second floor of Building 41 at Microsoft to create a brand-new language, C#. The guiding principles of the language emphasized simplicity, familiarity, safety, and practicality. Of course, all those principles needed to balance against one another; none are...

Transforming Enterprise Cloud Services
Transforming Enterprise Cloud Services

Transforming Enterprise Cloud Services addresses the fundamental ideology of Cloud Services and how enterprises in commercial, federal, and defense industries can transform their current information technology and management models to adopt this new method. It goes beyond the mere description of service frameworks in relation to...

Congenital Heart Disease in Adults
Congenital Heart Disease in Adults

The adult population with congenital heart disease is increasing rapidly. More than 80% of children with congenital heart disease now reach adulthood, with some congenital heart diseases diagnosed for the first time in adults. The operations performed during childhood may have severe residual findings, which need to be repaired. Cardiologists...

Modeling and Tools for Network Simulation
Modeling and Tools for Network Simulation

A crucial step during the design and engineering of communication systems is the estimation of their performance and behavior; especially for mathematically complex or highly dynamic systems network simulation is particularly useful. This book focuses on tools, modeling principles and state-of-the art models for discrete-event based network...

Flash Multiplayer Virtual Worlds
Flash Multiplayer Virtual Worlds

Flash virtual worlds are some of the most exciting-and profitable-online business being built today. Using Flash, developers can build interactive environments where users can interact with the virtual world and one another, compete, and have fun. Creating a playful environment on an electronic network presents unique challenges as you...

Digital Terrain Modeling: Acquisition, Manipulation And Applications
Digital Terrain Modeling: Acquisition, Manipulation And Applications

With its expanding array of applications in everything from biodiversity modeling to wireless communications, it's no wonder digital terrain modeling (DTM) - the electronic process of representing topography in three dimensions -- is a hot subject among engineers and geoscientists. This concise resource is the first truly complete guide...

Practical Signcryption (Information Security and Cryptography)
Practical Signcryption (Information Security and Cryptography)

In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives...

Computational Geometry and Computer Graphics in C++
Computational Geometry and Computer Graphics in C++

Our principal objective in this book is to describe some basic problems that arise in computer graphics and computational geometry and to present some practical and relatively simple methods for solving them. In these pages we will not attempt a comprehensive survey of these fields. Rather, we will cover a number of core problems and...

Head First Python
Head First Python

Ever wished you could learn Python from a book? Head First Python is a complete learning experience for Python that helps you learn the language through a unique method that goes beyond syntax and how-to manuals, helping you understand how to be a great Python programmer. You'll quickly learn the language's...

Result Page: 108 107 106 105 104 103 102 101 100 99 98 97 96 95 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy