|
|
|
|
| | Learning PHP Data ObjectsThis book will introduce you to one of the most important extensions to PHP that are available, starting with PHP version 5.0—the PHP Data Objects, commonly known as PDO.
PHP grew in to a very popular web programming language due to its simplicity and ease of use. One of the key factors of this growing success is the built-in... | | |
|
How to Lie With Statistics"There is terror in numbers," writes Darrell Huff in How to Lie with Statistics. And nowhere does this terror translate to blind acceptance of authority more than in the slippery world of averages, correlations, graphs, and trends. Huff sought to break through "the daze that follows the collision of statistics with the... | | Artificial Neural Networks in Real-life ApplicationsThe analysis of the computational models developed up to the present day show that the artificial neural networks (ANN) have certain limits as information processing paradigms. We believe that these limitations may be due to the fact that the existing models neither reflect certain behaviours of the neurons nor consider the... | | |
|
Low Temperature Electronics: Physics, Devices, Circuits, and Applications
Low-temperature electronics has already been studied for more than five decades . Originally the main interest was in fundamental material properties at cryogenic temperatures . Although the real benefits of operating semiconductor devices were clearly demonstrated in the 1970s, a peak in activity occurred a decade later when the cryocompute... | | For Your Body Only: Discover the Diet You Were Born to EatCracking the code to the perfect personalized diet—and a lifetime of super-health Have you ever wondered why a new diet is invented almost every other day, yet obesity levels and disease in this country remain at an all-time high? Have you wondered why the diet that works so well for your friend has no impact on you—or even makes... | | Chemical Mechanical Polishing in Silicon Processing, Volume 63
In the engineering world, many ideas and plans are conceived in the
information exchanges that occur over lunch. In the summer of 1997, one of
the editors (Shin Hwa Li) was assigned to assist our CMP module at the
Crolles facility of STMicroelectronics near Grenoble, France. One day, in
the company cafeteria, while sitting near... |
|
| | The Legal Protection of Databases: A Comparative AnalysisThis book examines and compares the several types of protection available for the protection of investment in database creation. The protection of investment in making databases is not harmonized internationally. In some countries, database contents are insufficiently protected and, in others, there is too much protection. While database producers... | | Decomposition Methods for Differential Equations: Theory and ApplicationsDecomposition Methods for Differential Equations: Theory and Applications describes the analysis of numerical methods for evolution equations based on temporal and spatial decomposition methods. It covers real-life problems, the underlying decomposition and discretization, the stability and consistency analysis of the decomposition... |
|
|
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |