Home | Amazing | Today | Tags | Publishers | Years | Search 
Recommender Systems Handbook
Recommender Systems Handbook

The explosive growth of e-commerce and online environments has made the issue of information search and selection increasingly serious; users are overloaded by options to consider and they may not have the time or knowledge to personally evaluate these options. Recommender systems have proven to be a valuable way for online users to cope with...

Unreal Development Kit Game Design Cookbook
Unreal Development Kit Game Design Cookbook

Unreal Development Kit Game Design Cookbook explores how real-time environments are built. Key features of UDK are examined—assets, animation, light, materials, game controls, user interface, special effects, and interactivity—with the objective to make UDK more technically accessible so that users can transcend technique and...

Automated Software Testing: Introduction, Management, and Performance: Introduction, Management, and Performance
Automated Software Testing: Introduction, Management, and Performance: Introduction, Management, and Performance
Automated Software Testing addresses the challenge for today’s software professionals who are faced with real schedule deadlines and need to introduce, manage, and perform automated testing on a project. The book addresses automated testing within a client-server or Web environment.

The focus of this book is
...
Essential App Engine: Building High-Performance Java Apps with Google App Engine (Developer's Library)
Essential App Engine: Building High-Performance Java Apps with Google App Engine (Developer's Library)
A single hype is not enough to change the world. But multiple hypes together can change it as long as they are part of a bigger trend.

This book discusses more than one hyped technology: cloud computing, NoSQL, and HTML5. The technologies in this book combine well with other hyped technologies: functional
...
Membrane Technology and Applications
Membrane Technology and Applications
My introduction to membranes was as a graduate student in 1963. At that time membrane permeation was a sub-study of materials science. What is now called membrane technology did not exist, nor did any large industrial applications of membranes. Since then, sales of membranes and membrane equipment have increased more than...
Managing Oracle Fusion Applications (Oracle Press)
Managing Oracle Fusion Applications (Oracle Press)
Fusion Applications takes the concept of an Enterprise Application to a whole new level. Whether you’re in the IT department, a systems integrator, a business leader, or an end user, Fusion Applications has more of what you need, less of what you don’t, and some of what you didn’t even think possible.
...
Character Animation Fundamentals: Developing Skills for 2D and 3D Character Animation
Character Animation Fundamentals: Developing Skills for 2D and 3D Character Animation

Expand your animation toolkit and remain competitive in the industry with this leading resource for 2D and 3D character animation techniques. Apply the industry's best practices to your own workflows and develop 2D, 3D and hybrid characters with ease. With side by side comparisons of 2D and 3D character design, improve your character...

Robotic Micro-Assembly
Robotic Micro-Assembly
This book deals with the current methods developed around the world on robotic microassembly. It is dedicated to Master’s and Ph.D. students, and also scientists and engineers involved in microrobotics and also in robotics. As robotic microassembly is a new way to manufacture microelectromechanical systems (MEMS),...
The CERT® Oracle® Secure Coding Standard for Java (SEI Series in Software Engineering)
The CERT® Oracle® Secure Coding Standard for Java (SEI Series in Software Engineering)

An essential element of secure coding in the Java programming language is a welldocumented and enforceable coding standard. The CERT Oracle Secure Coding Standard for Java provides rules for secure coding in the Java programming language. The goal of these rules is to eliminate insecure coding practices that can lead to exploitable...

Spacecraft Attitude Determination and Control (Astrophysics and Space Science Library)
Spacecraft Attitude Determination and Control (Astrophysics and Space Science Library)
Extensive work has been done for many years in the areas of attitude determination, attitude prediction, and attitude control. During this time, it has been difficult to obtain reference material that provided a comprehensive overview of attitude support activities. This lack of reference material has made it difficult for...
Autonomous Intelligent Vehicles: Theory, Algorithms, and Implementation (Advances in Computer Vision and Pattern Recognition)
Autonomous Intelligent Vehicles: Theory, Algorithms, and Implementation (Advances in Computer Vision and Pattern Recognition)
Over the years, the field of intelligent vehicles has become a major research theme in intelligent transportation systems since traffic accidents are serious and growing problems all over the world. The goal of an intelligent vehicle is to augment vehicle autonomous driving either entirely or partly for the purposes of safety,...
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Result Page: 229 228 227 226 225 224 223 222 221 220 219 218 217 216 215 214 213 212 211 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy