Home | Amazing | Today | Tags | Publishers | Years | Search 
Spatially Structured Evolutionary Algorithms: Artificial Evolution in Space and Time (Natural Computing Series)
Spatially Structured Evolutionary Algorithms: Artificial Evolution in Space and Time (Natural Computing Series)
Evolutionary algorithms (EAs) is now a mature problem-solving family of heuristics that has found its way into many important real-life problems and into leading-edge scientific research. Spatially structured EAs have different properties than standard, mixing EAs. By virtue of the structured disposition of the population members they bring about...
Foundations of Learning Classifier Systems (Studies in Fuzziness and Soft Computing)
Foundations of Learning Classifier Systems (Studies in Fuzziness and Soft Computing)
Learning Classifier Systems (LCS) [Holland, 1976] are a machine learning technique which combines evolutionary computing, reinforcement learning, supervised learning or unsupervised learning, and heuristics to produce adaptive systems. They are rulebased systems, where the rules are usually in the traditional production system form of “IF...
Understanding Knowledge as a Commons: From Theory to Practice
Understanding Knowledge as a Commons: From Theory to Practice
Knowledge in digital form offers unprecedented access to information through the Internet but at the same time is subject to ever-greater restrictions through intellectual property legislation, overpatenting, licensing, overpricing, and lack of preservation. Looking at knowledge as a commons--as a shared resource--allows us to understand both its...
Microsoft(R) Operations Manager 2005 Unleashed (MOM): With A Preview of Operations Manager 2007
Microsoft(R) Operations Manager 2005 Unleashed (MOM): With A Preview of Operations Manager 2007
With the licensing of NetIQ’s Operation Manager technology in 2000, Microsoft sent a message that it was serious about server monitoring and management. This message was well received; those production environments running Windows servers and using a Microsoft infrastructure require tools to help them be proactive in managing those servers...
Multivariate Public Key Cryptosystems (Advances in Information Security)
Multivariate Public Key Cryptosystems (Advances in Information Security)

Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes have increasingly been seen as a possible alternative to number theoretic-based cryptosystems such as RSA, as they are generally more efficient in terms of computational effort. As quantum computers are developed, MPKC...

Haskell: The Craft of Functional Programming (2nd Edition)
Haskell: The Craft of Functional Programming (2nd Edition)
The second edition of Haskell: The Craft of Functional Programming is essential reading for beginners to functional programming and newcomers to the Haskell programming language. The emphasis is on the process of crafting programs and the text contains many examples and running case studies, as well as advice an program design, testing, problem...
Cisco CCIE Fundamentals: Network Design & Case Studies
Cisco CCIE Fundamentals: Network Design & Case Studies
For a sophisticated view of networking design concepts that goes from lofty to granular in the blink of an eye, Network Design and Case Studies is a sure winner. This mammoth entry in Cisco's growing collection of reference books provides equal parts academic theory and practical application.

The first half of the book deals...

Professional SQL Server 2005 Programming (Programmer to Programmer)
Professional SQL Server 2005 Programming (Programmer to Programmer)
Professional SQL Server 2005 Programming shows experienced developers how to master the substantially revamped feature set of the latest release of Microsoft SQL Server. The book begins with a concise overview of the new features of SQL Server that is of interest to experienced developers. This is especially important given the substantial...
Instant Messaging in Java: The Jabber Protocols
Instant Messaging in Java: The Jabber Protocols
Written as a mid-level programming guide, this book provides Java programmers with the information and tools needed to create their own Instant Messenger client and server software. This software can then be used to create personalized IM systems or integrate IM features into existing software. Focus is given to the open source Jabber XML-based IM...
Object Solutions: Managing the Object-Oriented Project (OBT)
Object Solutions: Managing the Object-Oriented Project (OBT)
Early adopters of object-oriented technology took it on faith that object orientation
was A Good Thing, offering hope for improving some ugly aspect of software
development. Some of these primordial efforts truly flourished, some
failed, but overall, a number of such projects quietly began to experience the
anticipated benefits
...
Hacker's Delight
Hacker's Delight

This is a collection of small programming tricks that I have come across over many years. Most of them will work only on computers that represent integers in two's-complement form. Although a 32-bit machine is assumed when the register length is relevant, most of the tricks are easily adapted to machines with other register...

Performance of Computer Communication Systems: A Model-Based Approach
Performance of Computer Communication Systems: A Model-Based Approach
Performance of Computer Communication Systems A Model-Based Approach Boudewijn R. Haverkort Rheinisch-Westfälische Technische Hochschule Aachen, Germany Computer communication systems and distributed systems are now able to provide an increasing range of services. As the timing requirements in the operation of these services are becoming...
Result Page: 397 396 395 394 393 392 391 390 389 388 387 386 385 384 383 382 381 380 379 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy