Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python Text Processing with NLTK 2.0 Cookbook
Python Text Processing with NLTK 2.0 Cookbook

Natural Language Processing is used everywhere - in search engines, spell checkers, mobile phones, computer games - even your washing machine. Python's Natural Language Toolkit (NTLK) suite of libraries has rapidly emerged as one of the most efficient tools for Natural Language Processing. You want to employ nothing less than the best...

Press On: Principles of Interaction Programming
Press On: Principles of Interaction Programming

Interactive systems and devices, from mobile phones to office copiers, do not fulfill their potential for a wide variety of reasons--not all of them technical. Press On shows that we can design better interactive systems and devices if we draw on sound computer science principles. It uses state machines and graph theory as a powerful and...

Annoying: The Science of What Bugs Us
Annoying: The Science of What Bugs Us

Two crackerjack science journalists from NPR look at why some things (and some people!) drive us crazy

It happens everywhere?offices, schools, even your own backyard. Plus, seemingly anything can trigger it?cell phones, sirens, bad music, constant distractions, your boss, or even your spouse. We all know certain things get...

Building Enterprise Ready Telephony Systems with sipXecs 4.0
Building Enterprise Ready Telephony Systems with sipXecs 4.0
Open source telephony systems are making big waves in the communications industry. Moving your organization from a lab environment to production system can seem like a daunting and inherently risky proposition. Building Enterprise Ready Telephony Systems with sipXecs delivers proven techniques for deploying reliable and robust communications...
Packet Guide to Voice over IP: A system administrator's guide to VoIP technologies
Packet Guide to Voice over IP: A system administrator's guide to VoIP technologies

Go under the hood of an operating Voice over IP network, and build your knowledge of the protocols and architectures used by this Internet telephony technology. With this concise guide, you’ll learn about services involved in VoIP and get a first-hand view of network data packets from the time the phones boot through calls and...

Macs on the Go!: Mobile Computing Guide
Macs on the Go!: Mobile Computing Guide
With laptops, notebooks, and tablet PCs slated to make up more than half of all U.S. personal computer sales by 2007, mobile computing is no longer limited to business users and gadget hounds. If you plan to take your Mac on the road, this book shows you how to do so quickly, effectively, and with a minimum of hassle and headaches! In a friendly,...
Embedded Java Security: Security for Mobile Devices
Embedded Java Security: Security for Mobile Devices
This book is a comprehensive presentation of embedded Java security (namely, J2ME CLDC/MIDP), in the sense that the security model of embedded Java is thoroughly explained, then a detailed analysis of this model is undertaken. It is compared with the security model of Java Standard Edition in order to view the impact of limited resources (typically...
EDA for IC Implementation, Circuit Design, and ProcessTechnology (Electronic Design Automation for Integrated Circuits Handbook)
EDA for IC Implementation, Circuit Design, and ProcessTechnology (Electronic Design Automation for Integrated Circuits Handbook)
Electronic Design Automation (EDA) is a spectacular success in the art of engineering.Over the last quarter of a century, improved tools have raised designers’ productivity by a factor of more than a thousand.

Without EDA,Moore’s law would remain a useless curiosity. Not a single billion-transistor chip could be designed or
...
Understanding Telecommunications and Lightwave Systems: An Entry-Level Guide, 3rd Edition
Understanding Telecommunications and Lightwave Systems: An Entry-Level Guide, 3rd Edition
"...provides a non-technical overview of contemporary telecommunications systems." (SciTech Book News, Vol. 26, No. 2, June 2002)

The up-to-date edition of the bestselling guide to the basics of telecommunications and digital technology

Understanding Telecommunications and...

Android Malware (SpringerBriefs in Computer Science)
Android Malware (SpringerBriefs in Computer Science)

Mobile devices, such as smart phones, have achieved computing and networking capabilities comparable to traditional personal computers. Their successful consumerization has also become a source of pain for adopting users and organizations. In particular, the widespread presence of information-stealing applications and other types of mobile...

Multimedia Messaging Service: An Engineering Approach to MMS
Multimedia Messaging Service: An Engineering Approach to MMS
The Multimedia Messaging Service (MMS) is regarded as the best-of-the breed of proven messaging technologies, surpassing SMS and electronic mail to offer a truly multimedia experience to mobile users. The first commercial solutions appeared on the market in 2002 and the penetration rate of MMS is now quickly approaching the required level for...
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition) (Self-Study Guide)
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition) (Self-Study Guide)

Foundation Learning for CCVP IP Telephony

Jeremy Cioara, CCIEВ® No. 11,727

Cisco IP Telephony (CIPT), Second Edition, is a CiscoВ®-authorized, self-paced learning tool for CCVP IP...

unlimited object storage image
Result Page: 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy