 |
|
|
 Developments and Challenges for Autonomous Unmanned Vehicles: A Compendium
It is widely anticipated that autonomous vehicles will have a transformational impact on military forces and will play a key role in many future force structures. As a result, many tasks have already been identified that unmanned systems could undertake more readily than humans. However, for this to occur, such systems will need to be agile,... |  |  Social Computing: Concepts, Methodologies, Tools, and Applications
Social Computing: Concepts, Methodologies, Tools, and Applications uncovers the growing and expanding phenomenon of human behavior, social constructs, and communication in online environments. This multiple volume publication presents the latest research on social change, evolving networks, media, and interaction with technology to offer... |  |  Domain-Specific Model-Driven Testing
Software reuse and software quality are increasingly important topics in today's software engineering both for researchers and for practitioners. The design and implementation of tests is especially challenging when tests are conceptualized for different variants and versions of an application. Stefan Baerisch applies a combination of... |
|
 Pro WPF in VB 2010 (Beginning)
Microsoft’s Windows Presentation Foundation (WPF) provides the foundation for building applications and high-quality user experiences for the Windows operating system. It blends the application user interface, documents, and media content, while exploiting the full power of your computer’s operating system.
Its... |  |  Secrets of the Millionaire Mind: Mastering the Inner Game of Wealth
SECRETS OF THE MILLIONAIRE MIND reveals the missing link between wanting success and achieving it!
Have you ever wondered why some people seem to get rich easily, while others are destined for a life of financial struggle? Is the difference found in their education, intelligence, skills, timing, work habits, contacts, luck, or... |  |  Advances in Artificial Intelligence for Privacy Protection and Security
In this book, we aim to collect the most recent advances in artificial intelligence techniques (i.e. neural networks, fuzzy systems, multi-agent systems, genetic algorithms, image analysis, clustering, etc), which are applied to the protection of privacy and security. The symbiosis between these fields leads to a pool of invigorating ideas,... |
|
|
Result Page: 199 198 197 196 195 194 193 192 191 190 189 188 187 186 185 184 183 182 181 |