Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Art of Computer Programming, Volume 2: Seminumerical Algorithms (3rd Edition)
Art of Computer Programming, Volume 2: Seminumerical Algorithms (3rd Edition)

The bible of all fundamental algorithms and the work that taught many of today's software developers most of what they know about computer programming.

 

Byte, September 1995

 

...
Reasoning with Probabilistic and Deterministic Graphical Models: Exact Algorithms (Synthesis Lectures on Artificial Intelligence and Machine Learning)
Reasoning with Probabilistic and Deterministic Graphical Models: Exact Algorithms (Synthesis Lectures on Artificial Intelligence and Machine Learning)

Graphical models (e.g., Bayesian and constraint networks, influence diagrams, and Markov decision processes) have become a central paradigm for knowledge representation and reasoning in both artificial intelligence and computer science in general. These models are used to perform many reasoning tasks, such as scheduling, planning and...

Introduction to Embedded Systems: Using ANSI C and the Arduino Development Environment (Synthesis Lectures on Digital Circuits and Systems)
Introduction to Embedded Systems: Using ANSI C and the Arduino Development Environment (Synthesis Lectures on Digital Circuits and Systems)

Many electrical and computer engineering projects involve some kind of embedded system in which a microcontroller sits at the center as the primary source of control.

The recently-developed Arduino development platform includes an inexpensive hardware development board hosting an eight-bit ATMEL ATmega-family processor...

WiFi Hacking for Beginners
WiFi Hacking for Beginners

In this book you will start as a beginner with no previous knowledge about penetration testing. The book is structured in a way that will take you through the basics of networking and how clients communicate with each other, then we will start talking about how we can exploit this method of communication to carry out a number of powerful...

Excel Functions and Formulas Pocketbook
Excel Functions and Formulas Pocketbook
Geared toward the intermediate to advanced Excel 2016 user, this pocketbook provides explanations and context for many powerful Excel 2016 spreadsheet formulas and functions. Step-by-step instructions for many formula/function-related features such as using range names, and Excel's troubleshooting features. Focus on clarity, accuracy,...
E=mc2: A Biography of the World's Most Famous Equation
E=mc2: A Biography of the World's Most Famous Equation

Already climbing the bestseller lists-and garnering rave reviews-this "little masterpiece"* sheds brilliant light on the equation that changed the world.

"This is not a physics book. It is a history of where the equation [E=mc2] came from and how it has changed the world. After a short chapter on the
...

Introduction to Reconfigurable Supercomputing (Synthesis Lectures on Computer Architecture)
Introduction to Reconfigurable Supercomputing (Synthesis Lectures on Computer Architecture)

This book covers technologies, applications, tools, languages, procedures, advantages, and disadvantages of reconfigurable supercomputing using Field Programmable Gate Arrays (FPGAs). The target audience is the community of users of High Performance Computers (HPC) who may benefit from porting their applications into a reconfigurable...

Cyber-Physical Security and Privacy in the Electric Smart Grid (Synthesis Lectures on Information Security, Privacy, and Tru)
Cyber-Physical Security and Privacy in the Electric Smart Grid (Synthesis Lectures on Information Security, Privacy, and Tru)

This book focuses on the combined cyber and physical security issues in advanced electric smart grids. Existing standards are compared with classical results and the security and privacy principles of current practice are illustrated. The book paints a way for future development of advanced smart grids that operated in a peer-to-peer fashion,...

Word Origins
Word Origins
The average English speaker knows around 50,000 words. That represents an astonishing diversity – nearly 25 times more words than there are individual stars visible to the naked eye in the night sky. And even 50,000 seems insignificant beside the half a million recorded in the Oxford English Dictionary. But looked at from an...
Polymorphism in Java: Methods and polymorphic algorithms applied to computer games
Polymorphism in Java: Methods and polymorphic algorithms applied to computer games
The creation of polymorphic algorithms is a necessary skill for programmers who intend to write reusable code. This book stands out for teaching programming based on polymorphism. Abundant examples in Java code and illustrative graphics of the main ideas related to the topic: Polymorphism in Java. The book "Polymorphism in Java" aims...
Arduino Microcontroller Processing for Everyone! (Synthesis Lectures on Digital Circuits and Systems)
Arduino Microcontroller Processing for Everyone! (Synthesis Lectures on Digital Circuits and Systems)
This book is about the Arduino microcontroller and the Arduino concept. The visionary Arduino team of Massimo Banzi, David Cuartielles, Tom Igoe, Gianluca Martino, and David Mellis launched a new innovation in microcontroller hardware in 2005, the concept of open source hardware. Their approach was to openly share details of...
JAVA DESIGN PATTERNS
JAVA DESIGN PATTERNS
If a problem occurs over and over again, a solution to that problem has been used effectively. That solution is described as a pattern. The design patterns are languageindependent strategies for solving common object-oriented design problems. When you make a design, you should know the names of some common solutions. Learning design...
Result Page: 65 64 63 62 61 60 59 58 57 56 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy