Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computational Intelligence in Time Series Forecasting: Theory and Engineering Applications
Computational Intelligence in Time Series Forecasting: Theory and Engineering Applications

Foresight can be crucial in process and production control, production-and-resources planning and in management decision making generally. Although forecasting the future from accumulated historical data has become a standard and reliable method in production and financial engineering, as well as in business and management, the use of time...

Complete Web Monitoring: Watching your visitors, performance, communities, and competitors
Complete Web Monitoring: Watching your visitors, performance, communities, and competitors
Do you really understand your online presence? Are you confident that visitors can use your website? Do you know their motivations? How do online communities perceive your company? To innovate and adapt your business quickly, you must know the answers to these questions. Complete Web Monitoring demonstrates how to measure every aspect of your web...
12 Essential Skills for Software Architects
12 Essential Skills for Software Architects
As you start reading this book, I hope you are prepared to keep an open mind and are willing to try some new approaches to your daily life.

My name is Dave Hendricksen, and I have the privilege of being a software architect for Thomson Reuters, where the focus of my work is on producing intelligent legal
...
Math You Can't Use: Patents, Copyright, and Software
Math You Can't Use: Patents, Copyright, and Software
The field of software is awash in disputes. Market participants and analysts routinely disagree on how computer programs should be produced, marketed, regulated, and sold. On one subject, however, just about everyone can agree: the current intellectual property protection regime for software is a mess. At present, all of the traditional means...
Outsource It!: A No-Holds-Barred Look at the Good, the Bad, and the Ugly of Offshoring Tech Projects
Outsource It!: A No-Holds-Barred Look at the Good, the Bad, and the Ugly of Offshoring Tech Projects

If you need to expand your business but not your budget, if your group has an intense but short-term project, if you don't have the skill set to get a job done-it's time to think about outsourcing. Starting from the first step (should you outsource part of your tech work?) to the last (how can you protect your intellectual...

Studies in Complexity and Cryptography: Miscellanea on the Interplay between Randomness and Computation
Studies in Complexity and Cryptography: Miscellanea on the Interplay between Randomness and Computation

This volume contains a collection of studies in the areas of complexity theory and foundations of cryptography. These studies were conducted at different times during the last couple of decades. Although many of these studies have been referred to by other works, none of them was formally published before.

Indeed, this volume...

The AWK Programming Language
The AWK Programming Language

Computer users spend a lot of time doing simple, mechanical data manipulation - changing the format of data, checking its validity, finding items with some property, adding up numbers, printing reports, and the like. All of these jobs ought to be mechanized, but it's a real nuisance to have to write a specialpurpose program in a...

Instant Website Optimization for Retina Displays How-to
Instant Website Optimization for Retina Displays How-to

Learning simple techniques which will make your website look stunning on high-definition Retina Displays

Overview

  • Learn something new in an Instant! A short, fast, focused guide delivering immediate results
  • Create high-resolution graphics for websites.
  • Learn to create...
Architectural Design of Multi-Agent Systems: Technologies and Techniques (Premier Reference Series)
Architectural Design of Multi-Agent Systems: Technologies and Techniques (Premier Reference Series)
Multi-agent systems (MAS) have emerged as a new methodology to address the issues in organizing large-scale software systems. This methodology provides a conceptual model that helps maintaining constraints, a task conventional software engineering is unable to achieve. In recent years, MAS has been used in various areas in computer science and...
Blackhatonomics: An Inside Look at the Economics of Cybercrime
Blackhatonomics: An Inside Look at the Economics of Cybercrime

Would you be surprised if I say that the essence of cyber-crime comes down to traditional theft of property—be that of funds in accounts, of company data (and the financial harm that can cause), or of personal/confidential information (and the damage that can cause by it winding up in the wrong hands)? As time goes by, hackers, virus...

Quicken All-in-One Desk Reference For Dummies
Quicken All-in-One Desk Reference For Dummies
Your one-stop guide to making the most of Quicken's great financial tools

What's harder — earning money, or managing it? For most of us, that's tough to answer, but this book and Quicken will make the "managing" part a lot easier. Eight convenient minibooks cover things like setting up Quicken, saving money...

Enterprise Mac Managed Preferences
Enterprise Mac Managed Preferences

Many systems administrators on the Mac need a way to manage machine configuration after initial setup and deployment. Apple’s Managed Preferences system (also known as MCX) is under-documented, often misunderstood, and sometimes outright unknown by sys admins. MCX is usually deployed in conjunction with an OS X server, but it can also...

Result Page: 29 28 27 26 25 24 23 22 21 20 19 18 17 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy