Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Nonparametric Tests for Censored Data
Nonparametric Tests for Censored Data

This book concerns testing hypotheses in non-parametric models. Generalizations of many non-parametric tests to the case of censored and truncated data are considered. Most of the test results are proved and real applications are illustrated using examples. Theories and exercises are provided. The incorrect use of many tests applying most...

Big Data Made Easy: A Working Guide to the Complete Hadoop Toolset
Big Data Made Easy: A Working Guide to the Complete Hadoop Toolset

Many corporations are finding that the size of their data sets are outgrowing the capability of their systems to store and process them. The data is becoming too big to manage and use with traditional tools. The solution: implementing a big data system.

As Big Data Made Easy: A Working...

Reputation, Stock Price, and You: Why the Market Rewards Some Companies and Punishes Others
Reputation, Stock Price, and You: Why the Market Rewards Some Companies and Punishes Others

“All of our working lives we have heard the mantra, ‘a reputation lost is never regained.’ Still, the firms we work for, admire and invest in seem to take costly reputation hits all too often. Everyone interested in managing, regulating or investing in public firms will find Nir Kossovsky’s book a wonderful read...

Hypoplastic Left Heart Syndrome
Hypoplastic Left Heart Syndrome

-No other publication currently available offers such a comprehensive overview of the care required by a child with hypoplasia of the left heart

-Address the needs of the families of children born with this condition, and is the first to includes insight from parents

-Authors are acknowledged world leaders in the...

Disruption by Design: How to Create Products that Disrupt and then Dominate Markets
Disruption by Design: How to Create Products that Disrupt and then Dominate Markets

From Eli Whitney to Henry Ford to Ray Kroc to Steve Jobs, market disruptors have reaped the benefits, including fame and fortune. But do you have to be that rare genius whose unique skills can literally change the world? No. Disrupting a market is a discipline that can be learned. Disruption by Design—a handbook for...

PrimeFaces Cookbook
PrimeFaces Cookbook

Here are over 100 recipes for PrimeFaces, the ultimate JSF framework. It’s a great practical introduction to leading-edge Java web development, taking you from the basics right through to writing custom components.

Overview

  • The first PrimeFaces book that concentrates on practical approaches rather...
Building Python Real-Time Applications with Storm
Building Python Real-Time Applications with Storm

Learn to process massive real-time data streams using Storm and Python―no Java required!

About This Book

  • Learn to use Apache Storm and the Python Petrel library to build distributed applications that process large streams of data
  • Explore sample applications in real-time and analyze...
Visual Studio Code Distilled: Evolved Code Editing for Windows, macOS, and Linux
Visual Studio Code Distilled: Evolved Code Editing for Windows, macOS, and Linux

Use Visual Studio Code to write and debug code quickly and efficiently on any platform, for any device, using any programming language, and on the operating system of your choice.

Visual Studio Code is an open source and cross-platform development tool that focuses on code editing across a variety of development...

Java Image Processing Recipes: With OpenCV and JVM
Java Image Processing Recipes: With OpenCV and JVM
Quickly obtain solutions to common Java image processing problems, learn best practices, and understand everything OpenCV has to offer for image processing. You will work with a JVM image wrapper to make it very easy to run image transformation through pipelines and obtain instant visual feedback. This book makes heavy use of the...
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
Universities and Sustainable Communities: Meeting the Goals of the Agenda 2030 (World Sustainability Series)
Universities and Sustainable Communities: Meeting the Goals of the Agenda 2030 (World Sustainability Series)

The book showcases examples of university engagement in community initiatives and reports on the results from research and from a variety of institutional projects and programmes. As a whole, the book illustrates how actors at the community (microlevel) and other levels (meso and macro) can make valuable and concrete contributions to...

International Conference on Innovative Computing and Communications: Proceedings of ICICC 2018, Volume 1 (Lecture Notes in Networks and Systems (55))
International Conference on Innovative Computing and Communications: Proceedings of ICICC 2018, Volume 1 (Lecture Notes in Networks and Systems (55))

The book includes high-quality research papers presented at the International Conference on Innovative Computing and Communication (ICICC 2018), which was held at the Guru Nanak Institute of Management (GNIM), Delhi, India on 5–6 May 2018. Introducing the innovative works of scientists, professors, research scholars, students...

unlimited object storage image
Result Page: 1204 1203 1202 1201 1200 1199 1198 1197 1196 1195 1194 1193 1192 1191 1190 1189 1188 1187 1186 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy