Home | Amazing | Today | Tags | Publishers | Years | Search 
Literate Programming (Center for the Study of Language and Information - Lecture Notes)
Literate Programming (Center for the Study of Language and Information - Lecture Notes)

Computer programs arc fun to write, and well-written computer pro grams are fun to read. One of life's greatest pleasures can be the composition of a computer program that you know will be a pleasure for other people to read, and for yourself to read.

Computer programs can also do useful work. One of life's greatest...

The Soft Science of Road Racing Motorcycles
The Soft Science of Road Racing Motorcycles
If your intention is to improve, not just pick up some "tricks," you should understand exactly what is going on with the most mportant part of the riding package, the rider. After all. whether your bike works well or not is measured in ten/thousandths of inches and millimeters, that's how far machine technology has...
BlackBerry Development Fundamentals
BlackBerry Development Fundamentals

Welcome to BlackBerry Development Fundamentals. I hope you enjoy reading this book and keep it on your bookshelf for a long time. After working for Research In Motion (RIM) and helping its customers understand their options for building custom applications for the BlackBerry platform, I knew the time was right for a book like this....

Detection Theory: Applications and Digital Signal Processing
Detection Theory: Applications and Digital Signal Processing

This book has its origin in lecture notes created at the Naval Postgraduate School (NPS), whose student and faculty support made The book is written for senior undergraduates and first dents. Practicing engineers should especially find the book the basic knowledge of detection and estimation theory. the text deals with detection aspects,...

The Traveling Salesman: Computational Solutions for TSP Applications (Lecture Notes in Computer Science)
The Traveling Salesman: Computational Solutions for TSP Applications (Lecture Notes in Computer Science)

More than fifteen years ago, I was faced with the following problem in an assignment for a class in computer science. A brewery had to deliver beer to five stores, and the task was to write a computer program for determining the shortest route for the truck driver to visit all stores and return to the brewery. All my attemps to find a...

CMMI for Services: Guidelines for Superior Service
CMMI for Services: Guidelines for Superior Service

CMMI® for Services (CMMI-SVC) is a comprehensive set of guidelines to help organizations establish and improve processes for delivering services. By adapting and extending proven standards and best practices to reflect the unique challenges faced in service industries, CMMI-SVC offers providers a...

Robot Builder's Bonanza, 4th Edition
Robot Builder's Bonanza, 4th Edition

Which of these fields are involved in robotics? You may choose from the following: engineering, electronics, psychology, sociology, biology, physics, artificial intelligence, math, art, mechanical design, mechanical construction, computer programming, sound synthesis, vision, ultrasonics, linguistics, microelectronics, process control,...

Visualization of Scientific Parallel Programs (Lecture Notes in Computer Science)
Visualization of Scientific Parallel Programs (Lecture Notes in Computer Science)

The substantial effort of parallel programming is only justified if the resulting codes are adequately efficient. In this sense, all types of performance tuning are extremely important to parallel software development. With parallel programs, performance improvements are much more difficult to achieve than with con ventional...

Towards Dynamic Randomized Algorithms in Computational Geometry (Lecture Notes in Computer Science)
Towards Dynamic Randomized Algorithms in Computational Geometry (Lecture Notes in Computer Science)

Computational geometry concerns itself with designing and analyzing algorithms for solving geometric problems. The field has reached a high level of sophistication, and very complicated algorithms have been designed. However, it is also useful to develop more practical algorithms, so long as they are based on rigorous methods. One such method...

Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

Natural language communication with computers (Lecture notes in computer science)
Natural language communication with computers (Lecture notes in computer science)

In recent years in numerous countries, attempts have been made to   develop natural language systems of communication with computers.

This research has been initiated by well-known research institutes sponsored often by government research programs.

This publication should facilitate an exchange of information,...

An Extended Entity-Relationship Model: Fundamentals and Pragmatics (Lecture Notes in Computer Science)
An Extended Entity-Relationship Model: Fundamentals and Pragmatics (Lecture Notes in Computer Science)
Studying modern database languages one recognizes that there is a gap between language features and theoretical foundations:

* Studies of the formal foundations exist for the relational data model but not for the Entity-Relationship model, which is a model used by numerous practical people. Also, most extensions of
...
Result Page: 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy