Home | Amazing | Today | Tags | Publishers | Years | Search 
Information Foraging Theory: Adaptive Interaction with Information (Oxford Series in Human-Technology Interaction)
Information Foraging Theory: Adaptive Interaction with Information (Oxford Series in Human-Technology Interaction)
Although much of the hubris and hyperbole surrounding the 1990's Internet has softened to a reasonable level, the inexorable momentum of information growth continues unabated. This wealth of information provides resources for adapting to the problems posed by our increasingly complex world, but the simple availability of more information does not...
Microsoft Data Mining: Integrated Business Intelligence for e-Commerce and Knowledge Management
Microsoft Data Mining: Integrated Business Intelligence for e-Commerce and Knowledge Management
Data mining exploits the knowledge that is held in the enterprise data store by examining the data to reveal patterns that suggest better ways to produce profit, savings, higher-quality products, and greater customer satisfaction. Just as the lines on our faces reveal a history of laughter and frowns, the patterns embedded in data reveal a history...
Distributed Computing and Internet Technology: First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004
Distributed Computing and Internet Technology: First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004
This book constitutes the refereed proceedings of the First International Conference on Distributed Computing and Internet Technology, ICDCIT 2004, held in Bhubaneswar, India in December 2004.

The 47 revised papers presented together with 3 invited papers and 5 abstracts of invited or workshop papers were carefully reviewed and selected from...

Transactions on Data Hiding and Multimedia Security II (Lecture Notes in Computer Science)
Transactions on Data Hiding and Multimedia Security II (Lecture Notes in Computer Science)
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to...
Essentials of Programming Languages, 3rd Edition
Essentials of Programming Languages, 3rd Edition

This book brings you face-to-face with the most fundamental idea in computer programming:

The interpreter for a computer language is just another program. It sounds obvious, doesn’t it? But the implications are profound. If you are a computational theorist, the interpreter idea recalls Gödel’s discovery of
...

Rough Computing: Theories, Technologies and Applications
Rough Computing: Theories, Technologies and Applications
Rough set theory is a new soft computing tool which deals with vagueness and uncertainty. It has attracted the attention of researchers and practitioners worldwide, and has been successfully applied to many fields such as knowledge discovery, decision support, pattern recognition, and machine learning.

Rough Computing: Theories,...

Database and Data Communication Network Systems, Three-Volume Set: Techniques and Applications
Database and Data Communication Network Systems, Three-Volume Set: Techniques and Applications
Database and Data Communication Network Systems examines the utilization of the Internet and Local Area/Wide Area Networks in all areas of human endeavor. This three-volume set covers, among other topics, database systems, data compression, database architecture, data acquisition, asynchronous transfer mode (ATM) and the practical...
Moving Objects Databases (The Morgan Kaufmann Series in Data Management Systems)
Moving Objects Databases (The Morgan Kaufmann Series in Data Management Systems)
This book represents a milestone in the synthesis of temporal and spatial database concepts and techniques. It unifies and organizes the existing research into a coherent whole and presents substantial new results and approaches in many areas. In each case it begins with what is known, then it introduces the new concepts in an abstract and...
Pattern Recognition, Second Edition
Pattern Recognition, Second Edition
Pattern recognition is becoming increasingly important in the age of automation and information handling and retrieval.
This book provides the most comprehensive treatment available of pattern recognition, from an engineering perspective. Developed through more than ten years of teaching experience, Pattern Recognition is appropriate for both
...
Prosody in Speech Understanding Systems (Lecture Notes in Computer Science)
Prosody in Speech Understanding Systems (Lecture Notes in Computer Science)
Speech technology, the automatic processing of (spontaneously) spoken language, is now known to be technically feasible. It will become the major tool for handling the confusion of languages with applications including dictation systems, information retrieval by spoken dialog, and speech-to-speech translation. The book gives a throrough account of...
Algorithms and Data Structures: The Basic Toolbox
Algorithms and Data Structures: The Basic Toolbox
Algorithms are at the heart of every nontrivial computer application, and algorithmics is a modern and active area of computer science. Every computer scientist and every professional programmer should know about the basic algorithmic toolbox: structures that allow efficient organization and retrieval of data, frequently used algorithms, and basic...
JDBC 4.0 and Oracle JDeveloper for J2EE Development
JDBC 4.0 and Oracle JDeveloper for J2EE Development
Data retrieval and storage are one of the most common components of J2EE applications. JDBC (Java DataBase Connectivity) is the Java API for accessing a Structured Query Language (SQL) relational database and adding, retrieving, and updating data in the database. JDBC 3.0 specification is the current specification implemented by most application...
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy