Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python Machine Learning Cookbook
Python Machine Learning Cookbook

100 recipes that teach you how to perform various machine learning tasks in the real world

About This Book

  • Understand which algorithms to use in a given context with the help of this exciting recipe-based guide
  • Learn about perceptrons and see how they are used to build neural...
OpenGL Insights
OpenGL Insights

OpenGL is not a single API anymore. OpenGL has involved into a family of APIs, with OpenGL, OpenGL ES, and WebGL being closely related siblings that enable application developers to write and deploy graphics applications on a wide variety of platforms and operating systems. OpenGL has become an ecosystem; 3D graphics is truly everywhere now....

The Myths of Security: What the Computer Security Industry Doesn't Want You to Know
The Myths of Security: What the Computer Security Industry Doesn't Want You to Know
If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. Why is...
RF and Microwave Circuits, Measurements, and Modeling (The RF and Microwave Handbook, Second Edition)
RF and Microwave Circuits, Measurements, and Modeling (The RF and Microwave Handbook, Second Edition)

The first edition of the RF and Microwave Handbook was published in 2000. The project got off to an inauspicious start when 24 inches of snow fell in Denver the evening before the advisory board planned to hold their kick-off meeting. Two members of the board were trapped for days in the Denver airport since planes were not arriving or...

Managing Trust in Cyberspace
Managing Trust in Cyberspace

In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis...

JPEG2000 Standard for Image Compression: Concepts, Algorithms and VLSI Architectures
JPEG2000 Standard for Image Compression: Concepts, Algorithms and VLSI Architectures
We have seen the revolution in computer and communication technologies in the twentieth century. The telecommunications industry has gone through sea-changes from analog to digital networking that enabled today’s very powerful Internet technology. Transition from the analog to the digital world offered many opportunities in every walk of...
The Birth of Satan: Tracing the Devil's Biblical Roots
The Birth of Satan: Tracing the Devil's Biblical Roots
"An informative study of the biblical origins of Satan…With resourceful though never excessive citation, Mobley and Wray make a good job of pinning down the roots of a notoriously protean character."--The Times Literary Supplement

"Let's admit it. Even in a secular age we are all still
...
Integriertes Roadmapping: Nachhaltigkeitsorientierung in Innovationsprozessen des Pervasive Computing
Integriertes Roadmapping: Nachhaltigkeitsorientierung in Innovationsprozessen des Pervasive Computing

Innovationen entziehen sich immer deutlicher einer technologisch verkürzten Sichtweise. Angesichts der gestiegenen Dynamik und Komplexität der Umfeldbedingungen für Unternehmen kommen der Früherkennung und dem Monitoring technologischer, wirtschaftlicher, politischer und gesellschaftlicher Entwicklungen immer...

What Are Syndication Feeds
What Are Syndication Feeds
When you enter the world of syndicated content, you're often faced with the question of what is the "proper" way to do syndication. While syndication feeds have become a standard tool on the Web--you've seen their signposts: a little orange button labeled XML in white letters, or maybe buttons that say Atom, RSS 2.0, RSS 1.0, or even...
Hardware and Computer Organization (Embedded Technology)
Hardware and Computer Organization (Embedded Technology)
Today, we often take for granted the impressive array of computing machinery that surrounds us
and helps us manage our daily lives. Because you are studying computer architecture and digital
hardware, you no doubt have a good understanding of these machines, and you’ve probably written
countless programs on your PCs and
...
The Art of Agent-Oriented Modeling (Intelligent Robotics and Autonomous Agents)
The Art of Agent-Oriented Modeling (Intelligent Robotics and Autonomous Agents)
Today, when computing is pervasive and deployed over a range of devices by a multiplicity of users, we need to develop computer software to interact with both the ever-increasing complexity of the technical world and the growing fluidity of social organizations. The Art of Agent-Oriented Modeling presents a new conceptual model for...
Computers and Intractability: A Guide to the Theory of NP-Completeness (Series of Books in the Mathematical Sciences)
Computers and Intractability: A Guide to the Theory of NP-Completeness (Series of Books in the Mathematical Sciences)

Few technical lerms have gained such rapid notoriety as the appela tion "NP-complete." In the short lime since its introduction in the early 1970's, this term has come to symbolize the abyss of inherent intractability that algorithm designers increasingly face as they seek to solve larger and more complex problems. A...

Result Page: 18 17 16 15 14 13 12 11 10 9 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy