Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Uncertainty and Intelligent Information Systems
Uncertainty and Intelligent Information Systems
Intelligent systems are necessary to handle modern computer-based technologies managing information and knowledge. This book discusses the theories required to help provide solutions to difficult problems in the construction of intelligent systems. Particular attention is paid to situations in which the available information and data may be...
Access Nets: Third International Conference on Access Networks, AccessNets 2008, Las Vegas, NV, USA, October 15-17, 2008. Revised Papers
Access Nets: Third International Conference on Access Networks, AccessNets 2008, Las Vegas, NV, USA, October 15-17, 2008. Revised Papers

This book constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Access Networks, AccessNets 2008, held in Las Vegas, NV, USA, in October 2008.

The 30 revised full papers presented together with 5 invited papers were carefully reviewed and selected. The papers present original and...

Introduction to Contextual Processing: Theory and Applications
Introduction to Contextual Processing: Theory and Applications

Contextual computing has been around for several years with a variety of names such as pervasive computation and omnipresent computing. Recently there has been a drive toward making personal digital assistants (PDAs) more aware of their environment. For example, a cell phone may sense that it is in a conference room and reason that it should...

Ontology Matching
Ontology Matching

Ontologies tend to be found everywhere. They are viewed as the silver bullet for many applications, such as database integration, peer-to-peer systems, e-commerce, semantic web services, or social networks. However, in open or evolving systems, such as the semantic web, different parties would, in general, adopt different ontologies. Thus,...

The Hacker Playbook: Practical Guide To Penetration Testing
The Hacker Playbook: Practical Guide To Penetration Testing

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the...

Deep Learning for Computer Vision: Expert techniques to train advanced neural networks using TensorFlow and Keras
Deep Learning for Computer Vision: Expert techniques to train advanced neural networks using TensorFlow and Keras

Learn how to model and train advanced neural networks to implement a variety of Computer Vision tasks

Key Features

  • Train different kinds of deep learning model from scratch to solve specific problems in Computer Vision
  • Combine the power of Python, Keras, and TensorFlow to...
Next Generation Wireless Systems and Networks
Next Generation Wireless Systems and Networks
Next Generation Wireless Systems and Networks offers an expert view of cutting edge Beyond 3rd Generation (B3G) wireless applications. This self-contained reference combines the basics of wireless communications, such as 3G wireless standards, spread spectrum and CDMA systems, with a more advanced level research-oriented...
Frontiers of High Performance Computing and Networking  ISPA 2006 Workshops: ISPA 2006 International Workshops FHPCN, XHPC, S-GRACE, GridGIS, HPC-GTP
Frontiers of High Performance Computing and Networking ISPA 2006 Workshops: ISPA 2006 International Workshops FHPCN, XHPC, S-GRACE, GridGIS, HPC-GTP
This book constitutes the refereed joint proceedings of ten international workshops held in conjunction with the 4th International Symposium on Parallel and Distributed Processing and Applications, ISPA 2006, held in Sorrento, Italy in December 2006 (see LNCS 4330).

The 116 revised full papers presented were carefully reviewed and selected from...

Mike Meyers' A+ Certification Passport, Second Edition
Mike Meyers' A+ Certification Passport, Second Edition

Get on the road to becoming A+ certified with this concise, affordable study tool. Certification training guru Mike Meyers along with Martin Acuna will guide you on your career path, providing expert tips and sound advice along the way. With an intensive focus on only what you need to know to pass the test, this Certification Passport...

IP-Traffic Theory and Performance (Signals and Communication Technology)
IP-Traffic Theory and Performance (Signals and Communication Technology)
This book presents different approaches in IP traffic theory and classifies them, especially towards applications in the Internet. It comprises the state of the art in this area, which is currently presented only by numerous research papers and overview articles.

The book provides an ideal starting point for detailed studies of traffic analysis...

Advances in Computer-Supported Learning
Advances in Computer-Supported Learning
The Internet and growth of computer networks have eliminated geographic barriers, creating an environment where education can be brought to a student no matter where that student may be. The success of distance learning programs and the availability of many Web-supported applications and multimedia resources have increased the effectiveness of...
Microsoft Forefront UAG 2010 Administrator's Handbook
Microsoft Forefront UAG 2010 Administrator's Handbook

The Israeli department of defence has one of the strictest information security guidelines in the world, and a part of these guidelines is the requirement to have complete physical separation between the public and internal networks. A regular firewall just won't do, and this requirement gave birth to the concept of the Air-Gap, a...

unlimited object storage image
Result Page: 253 252 251 250 249 248 247 246 245 244 243 242 241 240 239 238 237 236 235 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy