|
|
|
|
Python Text Processing with NLTK 2.0 Cookbook
Natural Language Processing is used everywhere - in search engines, spell checkers, mobile phones, computer games - even your washing machine. Python's Natural Language Toolkit (NTLK) suite of libraries has rapidly emerged as one of the most efficient tools for Natural Language Processing. You want to employ nothing less than the best... | | Press On: Principles of Interaction Programming
Interactive systems and devices, from mobile phones to office copiers, do not fulfill their potential for a wide variety of reasons--not all of them technical. Press On shows that we can design better interactive systems and devices if we draw on sound computer science principles. It uses state machines and graph theory as a powerful and... | | Annoying: The Science of What Bugs Us
Two crackerjack science journalists from NPR look at why some things (and some people!) drive us crazy
It happens everywhere?offices, schools, even your own backyard. Plus, seemingly anything can trigger it?cell phones, sirens, bad music, constant distractions, your boss, or even your spouse. We all know certain things get... |
|
Building Enterprise Ready Telephony Systems with sipXecs 4.0Open source telephony systems are making big waves in the communications industry. Moving your organization from a lab environment to production system can seem like a daunting and inherently risky proposition. Building Enterprise Ready Telephony Systems with sipXecs delivers proven techniques for deploying reliable and robust communications... | | | | Macs on the Go!: Mobile Computing GuideWith laptops, notebooks, and tablet PCs slated to make up more than half of all U.S. personal computer sales by 2007, mobile computing is no longer limited to business users and gadget hounds. If you plan to take your Mac on the road, this book shows you how to do so quickly, effectively, and with a minimum of hassle and headaches! In a friendly,... |
|
Embedded Java Security: Security for Mobile DevicesThis book is a comprehensive presentation of embedded Java security (namely, J2ME CLDC/MIDP), in the sense that the security model of embedded Java is thoroughly explained, then a detailed analysis of this model is undertaken. It is compared with the security model of Java Standard Edition in order to view the impact of limited resources (typically... | | | | |
|
|
|
Result Page: 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 |