Home | Amazing | Today | Tags | Publishers | Years | Search 
Data Mining: A Heuristic Approach
Data Mining: A Heuristic Approach

The last decade has witnessed a revolution in interdisciplinary research where the boundaries of different areas have overlapped or even disappeared. New fields of research emerge each day where two or more fields have integrated to form a new identity. Examples of these emerging areas include bioinformatics (synthesizing biology with...

Genetic Algorithms + Data Structures = Evolution Programs
Genetic Algorithms + Data Structures = Evolution Programs

Genetic algorithms are founded upon the principle of evolution, i.e., survival of the fittest. Hence evolution programming techniques, based on genetic algorithms, are applicable to many hard optimization problems, such as optimization of functions with linear and nonlinear constraints, the traveling salesman problem, and problems of...

A Concise Introduction to Languages and Machines (Undergraduate Topics in Computer Science)
A Concise Introduction to Languages and Machines (Undergraduate Topics in Computer Science)

This book focuses on key theoretical topics of computing, in particular formal languages and abstract machines. It is intended primarily to support the theoretical modules on a computer science or computing-related undergraduate degree scheme.

Though the book is primarily theoretical in nature, it attempts to avoid the...

The Photoshop Elements 9 Book for Digital Photographers (Voices That Matter)
The Photoshop Elements 9 Book for Digital Photographers (Voices That Matter)

This book breaks new ground by doing something for digital photographers that’s never been done before—it cuts through the bull and shows you exactly “how to do it.” It’s not a bunch of theory; it doesn’t challenge you to come up with your own settings or figure things out on your own. Instead, it does...

Capturing Better Photos and Video with your iPhone
Capturing Better Photos and Video with your iPhone

Building a camera into a phone makes total sense. Th ese days, nearly everyone carries a cell phone with them at all times; and nearly everyone owns a small digital camera to take snapshots of things that are happening in their life. So putting the two together was a no-brainer. Why carry two things when you can carry one?

...

Inside the Machine: An Illustrated Introduction to Microprocessors and Computer Architecture
Inside the Machine: An Illustrated Introduction to Microprocessors and Computer Architecture

Inside the Machine is an introduction to computers that is intended to fill the gap that exists between classic but more challenging introductions to computer architecture, like John L. Hennessy’s and David A.

Patterson’s popular textbooks, and the growing mass of works that are simply too basic...

Programming Language Pragmatics, Third Edition
Programming Language Pragmatics, Third Edition

A course in computer programming provides the typical student's first exposure to the field of computer science. Most students in such a course will have used computers all their lives, for email, games, web browsing, word processing, social networking, and a host of other tasks, but it is not until they write their first programs that...

Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Lecture Notes in Computer Science)
Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Lecture Notes in Computer Science)

Concepts like ubiquitous computing and ambient intelligence that exploit increasingly interconnected networks and mobility put new requirements on data management. An important element in the connected world is that data will be accessible anytime anywhere. This also has its downside in that it becomes easier to get unauthorized data...

Computer Vision: From Surfaces to 3D Objects
Computer Vision: From Surfaces to 3D Objects

The typical computational approach to object understanding derives shape information from the 2D outline of the objects. For complex object structures, however, such a planar approach cannot determine object shape; the structural edges have to be encoded in terms of their full 3D spatial configuration. Computer Vision: From Surfaces...

The Mathematics of Coding Theory
The Mathematics of Coding Theory

This book is intended to be accessible to undergraduate students with two years of typical mathematics experience, most likely meaning calculus with a little linear algebra and differential equations. Thus, specifically, there is no assumption oLa background inabstr&;t algebra or number theory, nor of probability, nor of linear...

Deploying IP and MPLS QoS for Multiservice Networks: Theory & Practice
Deploying IP and MPLS QoS for Multiservice Networks: Theory & Practice

QoS, short for "quality of service," is one of the most important goals a network designer or administrator will have. Ensuring that the network runs at optimal precision with data remaining accurate, traveling fast, and to the correct user are the main objectives of QoS. The various media that fly across the network including...

Principles and Practice of Constraint Programming - CP 2006: 12th International Conference
Principles and Practice of Constraint Programming - CP 2006: 12th International Conference

The 12th International Conference on the Principles and Practice of Constraint Programming (CP 2006) was held in Nantes, France, September 24–29, 2006. Information about the conference can be found on theWeb at http://www.sciences. univ-nantes.fr/cp06/. Information about past conferences in the series can be found at...

Result Page: 259 258 257 256 255 254 253 252 251 250 249 248 247 246 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy