Home | Amazing | Today | Tags | Publishers | Years | Search 
Numerical Methods Using Matlab (Ellis Horwood Series in Mathematics & Its Applications)
Numerical Methods Using Matlab (Ellis Horwood Series in Mathematics & Its Applications)
Our primary aim is to introduce the render to a wide range of numerical algorithms, explain their fundamental principles and illustrate their application. The algorithms are implemented in the software package МАТ1.ЛН® because it provides a powerful tool to help with these studies.

Many
...
Encyclopedia of Parallel Computing (Springer Reference)
Encyclopedia of Parallel Computing (Springer Reference)
Parallelism, the capability of a computer to execute operations concurrently, has been a constant throughout the history of computing. It impacts hardware, software, theory, and applications. The fastest machines of the past few decades, the supercomputers, owe their performance advantage to parallelism. Today, physical limitations...
Open Source GIS: A GRASS GIS Approach
Open Source GIS: A GRASS GIS Approach
Over the past decade, Geographical Information Systems (GIS) have evolved from a highly specialized niche to a technology that affects nearly every aspect of our lives, from finding driving directions to managing natural disasters. While just a few years ago the use of GIS was restricted to a group of researchers, planners and...
Vision in 3D Environments
Vision in 3D Environments
Seeing in 3D is a fundamental problem for anyorganism or device that has to operate in the real world. Answering questions such as “how far away is that?” or “can we fit through that opening?” requires perceiving and making judgments about the size of objects in three dimensions. So how do we see in...
Information Extraction in the Web Era: Natural Language Communication for Knowledge Acquisition and Intelligent Information Agents
Information Extraction in the Web Era: Natural Language Communication for Knowledge Acquisition and Intelligent Information Agents

The number of research topics covered in recent approaches to Information Extraction (IE) is continually growing as new facts are being considered. In fact, while the user’s interest in extracting information from texts deals mainly with the success of the entire process of locating, in document collections, facts of interest,...

Mining Complex Data (Studies in Computational Intelligence)
Mining Complex Data (Studies in Computational Intelligence)

Data mining and knowledge discovery can today be considered as stable fields with numerous efficient methods and studies that have been proposed to extract knowledge from data. Nevertheless, the famous golden nugget is still challenging. Actually, the context evolved since the first definition of the KDD process and knowledge has now...

Advanced Artificial Intelligence (Series on Intelligence Science)
Advanced Artificial Intelligence (Series on Intelligence Science)

Artificial Intelligence's long-term goal is to build the human level of artificial intelligence. AI was born 50 years ago, in the bumpy road has made encouraging progress, in particular, machine learning, data mining, computer vision, expert systems, natural language processing, planning, robotics and related applications have...

Logical Foundations for Rule-Based Systems (Studies in Computational Intelligence)
Logical Foundations for Rule-Based Systems (Studies in Computational Intelligence)

Thinking in terms of facts and rules is perhaps one of the most common ways of approaching problem definition and problem solving both in everyday life and under more formal circumstances. The best known set of rules, the Ten Commandments have been accompanying us since the times of Moses; the Decalogue proved to be simple but...

Cryptology and Network Security: 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011
Cryptology and Network Security: 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011

It was a real pleasure to have taken part in organizing the 10th International Conference on Cryptography and Network Security (CANS 2011). It was held during December 10–12, 2011, at the International Asia Pacific Convention Center in Sanya, on the subtropical island of Hainan (China). CANS 2011 was sponsored by the National...

Knowledge Management (KM) Processes in Organizations: Theoretical Foundations and Practice
Knowledge Management (KM) Processes in Organizations: Theoretical Foundations and Practice
Knowledge Management (KM) is an effort to increase useful knowledge in the organization. It is a natural outgrowth of late twentieth century movements to make organizational management and operations more effective, of higher quality, and more responsive to constituents in a rapidly changing global environment. This document traces...
Sams Teach Yourself iOS 5 Application Development in 24 Hours (3rd Edition) (Sams Teach Yourself -- Hours)
Sams Teach Yourself iOS 5 Application Development in 24 Hours (3rd Edition) (Sams Teach Yourself -- Hours)

In less than half a decade, the iOS platform has changed the way that we, the public, think about our mobile computing devices. Only a few years ago, we were thrilled by phones with postage-stamp-sized screens, tinny audio, built-in tip calculators, and text-based web browsing. Times have indeed...

The Linux Command Line: A Complete Introduction
The Linux Command Line: A Complete Introduction

You've experienced the shiny, point-and-click surface of your Linux computer—now dive below and explore its depths with the power of the command line.

The Linux Command Line takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell. Along the way...

Result Page: 114 113 112 111 110 109 108 107 106 105 104 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy