|
|
|
|
Joomla! Start to Finish: How to Plan, Execute, and Maintain Your Web Site
Everything you need to know to plan and maintain a Joomla! site
Joomla! offers powerful functionality and ease of configuration, making it an immensely popular open source content management system. However, far more than simply downloading and installing Joomla! is required in order to create a dynamic web site. This book... | | Java, Java, Java, Object-Oriented Problem Solving (3rd Edition) This second edition of Java, Java, Java offers a robust, accessible, and flexible problem-solving perspective. The use of Unified Modeling Language (UML) diagrams throughout the text, strongly emphasizes object-oriented design. This book assists students and professionals with their most challenging problem as beginning programmers:... | | The Next Wave in Computing, Optimization, and Decision TechnologiesBrown et al. (2004) (see also Reed 1994 and Skroch 2004) model the completion of an adversarial nation’s nuclear-weapons program using general techniques of PERT. (See PERT 1958 and Malcolm et al. 1959 for the original descriptions of PERT, and see Moder et al. 1983 for a comprehensive review.) Brown et al. (2004) ask the... |
|
|
|
Diagrammatic Reasoning in AI
This book is really the end product of over a decade of work, on and off, on
diagrammatic reasoning in artificial intelligence (AI). In developing this book, I
drew inspiration from a variety of sources: two experimental studies, the development
of two prototype systems, an extensive literature review and analysis in
AI,... | | GeoSpatial Semantics: 4th International Conference, GeoS 2011, Brest, France, May 12-13, 2011
The fourth edition of the International Conference on Geospatial Semantics
(GeoS 2011) was held in Brest, France, during May 12–13, 2011.
Geospatial semantics (GEOS) is an emerging research area in the domain of
geographic information science. It aims at exploring strategies, computational
methods, and tools to support... | | Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic
commerce, and welfare disbursement require reliable person recognition systems.
Traditional person authentication methods based on passwords and identity
documents often fail to meet the stringent security and performance demands of
these... |
|
|
Result Page: 259 258 257 256 255 254 253 252 251 250 249 248 247 |