Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Design Pattern Formalization Techniques
Design Pattern Formalization Techniques
Software design is a fledgling discipline. When the “software crisis” came to be acknowledged during the late 1960s, software development projects have been marred by budget overflows and catastrophic failures. This situation has largely remained unchanged. Programmers still create poorly-understood systems of monstrous complexity which...
Fundamentals of the New Artificial Intelligence: Neural, Evolutionary, Fuzzy and More (Texts in Computer Science)
Fundamentals of the New Artificial Intelligence: Neural, Evolutionary, Fuzzy and More (Texts in Computer Science)
This book was originally titled “Fundamentals of the New Artificial Intelligence: Beyond Traditional Paradigms.” I have changed the subtitle to better represent the contents of the book. The basic philosophy of the original version has been kept in the new edition. That is, the book covers the most essential and widely employed material...
Information Technology in Environmental Engineering: Selected Contributions to the Sixth International Conference on Information Technologies in ... (Environmental Science and Engineering)
Information Technology in Environmental Engineering: Selected Contributions to the Sixth International Conference on Information Technologies in ... (Environmental Science and Engineering)

Information technologies have evolved to an enabling science for natural resource management and conservation, environmental engineering, scientific simulation and integrated assessment studies. Computing plays a significant role in the every day practices of environmental engineers, natural scientists, economists, and social scientists. The...

Planning in Intelligent Systems: Aspects, Motivations, and Methods (Wiley Series on Intelligent Systems)
Planning in Intelligent Systems: Aspects, Motivations, and Methods (Wiley Series on Intelligent Systems)
The first comparative examination of planning paradigms

This text begins with the principle that the ability to anticipate and plan is an essential feature of intelligent systems, whether human or machine. It further assumes that better planning results in greater achievements. With these principles as a foundation, Planning in Intelligent...

Stroke Genomics: Methods and Reviews (Methods in Molecular Medicine)
Stroke Genomics: Methods and Reviews (Methods in Molecular Medicine)

With sequencing of the human genome now complete, deciphering the role of gene function in human neurological pathophysiology is a promise that has yet to be realized. More than most diseases, stroke has been keenly studied from a genomic perspective. Studies are numerous and incorporate data on stroke inheritance, chromosomal loci of risk,...

Smart Intelligent Computing and Applications: Proceedings of the Second International Conference on SCI 2018, Volume 1 (Smart Innovation, Systems and Technologies, 104)
Smart Intelligent Computing and Applications: Proceedings of the Second International Conference on SCI 2018, Volume 1 (Smart Innovation, Systems and Technologies, 104)

The proceedings covers advanced and multi-disciplinary research on design of smart computing and informatics. The theme of the book broadly focuses on various innovation paradigms in system knowledge, intelligence and sustainability that may be applied to provide realistic solution to varied problems in society, environment and...

Strategic Software Engineering
Strategic Software Engineering
Software is a disruptive technology that has changed how almost every
sector of human society and the economy works. Software is now pervasive;
it is a component of almost every industrial product or at least
essential to the development of such products. Software capabilities lie at
the core of the new national and
...
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities...
Applying Domain-Driven Design and Patterns: With Examples in C# and .NET
Applying Domain-Driven Design and Patterns: With Examples in C# and .NET

“[This] is a book about design in the .NET world, driven in an agile manner and infused with the products of the enterprise patterns community. [It] shows you how to begin applying such things as TDD, object relational mapping, and DDD to .NET projects...techniques that many developers think are the key to future...

Cloud and Fog Computing in 5G Mobile Networks: Emerging Advances and Applications (Iet Telecommunications)
Cloud and Fog Computing in 5G Mobile Networks: Emerging Advances and Applications (Iet Telecommunications)

Now diffused among end-user devices in mobile and wireline networks, the "cloud" is becoming the "fog." This book focuses on the challenges and solutions related to cloud and fog computing for 5G mobile networks and presents novel approaches to the frameworks and schemes that carry out storage, communication, computation,...

Hands-On Meta Learning with Python: Meta learning using one-shot learning, MAML, Reptile, and Meta-SGD with TensorFlow
Hands-On Meta Learning with Python: Meta learning using one-shot learning, MAML, Reptile, and Meta-SGD with TensorFlow

Explore a diverse set of meta-learning algorithms and techniques to enable human-like cognition for your machine learning models using various Python frameworks

Key Features

  • Understand the foundations of meta learning algorithms
  • Explore practical examples to explore...
Programming Languages: An Active Learning Approach
Programming Languages: An Active Learning Approach
Programming Languages: An Active Learning Approach introduces students to three programming paradigms: object-oriented/imperative languages using C++ and Ruby, functional languages using Standard ML, and logic programming using Prolog. This interactive textbook is intended to be used in and outside of class. Each chapter follows a pattern of...
unlimited object storage image
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy