Home | Amazing | Today | Tags | Publishers | Years | Search 
Visualizing Data Patterns with Micromaps (Chapman & Hall/CRC Interdisciplinary Statistics)
Visualizing Data Patterns with Micromaps (Chapman & Hall/CRC Interdisciplinary Statistics)

After over fifteen years of research and trial and error, micromap designs have evolved to the point where they are slowly finding their way into mainstream statistical visualizations. Now seems to be a good time to pull all of the work together into a book in order to introduce micromaps to a wide range of people interested in...

The Google Resume: How to Prepare for a Career and Land a Job at Apple, Microsoft, Google, or any Top Tech Company
The Google Resume: How to Prepare for a Career and Land a Job at Apple, Microsoft, Google, or any Top Tech Company

Just so you’re clear: it was not my idea to give a talk to Microsoft Research. I had learned embarrassingly little about computer science in my 18 years of life, and the last thing I wanted to do is to have that exposed in front of a bunch of genius PhDs in MSR. But my manager thought it’d be a great...

MATLAB: An Introduction with Applications
MATLAB: An Introduction with Applications

MATLAB® is a very popular language for technical computing used by students, engineers, and scientists in universities, research institutes, and industries all over the world. The software is popular because it is powerful and easy to use. For university freshmen in it can be thought of as the next tool to use after the graphic...

From Computer to Brain
From Computer to Brain

In From Computer to Brain: Foundations of Computational Neuroscience, William Lytton provides a gentle but rigorous introduction to the art of modeling neurons and neural systems. It is an accessible entry to the methods and approaches used to model the brain at many di erent levels, ranging from synapses and dendrites to neurons and...

Elements of ML Programming, ML97 Edition (2nd Edition)
Elements of ML Programming, ML97 Edition (2nd Edition)

I became interested in ML programming when I taught CS109, the introduc- tory Computer Science Foundations course at Stanford, starting in 1991. ML was used by several of the instructors of this course, including Stu Reges and Mike Cleron, to introduce concepts such as functional programming and type systems. It was also used for the...

Operating Systems: A Spiral Approach
Operating Systems: A Spiral Approach

We have long felt that the traditional approach to teaching about Operating Systems (OSs) was not the best approach. The purpose of this book is to support a different approach to this task. When studying any complex domain of knowledge, the order in which one learns the hierarchy of principles, laws, ideas, and concepts can make the...

Elemental Magic, Volume I: The Art of Special Effects Animation
Elemental Magic, Volume I: The Art of Special Effects Animation

In the spring of 2004, at the Annecy International Animation Festival in France, a dear friend and I had a conversation about animation books. Interesting, we noted, that there is not a single book dedicated to classical hand-drawn special effects animation, even though it is an enormously important aspect of the animation business,...

Modeling and Control of Discrete-event Dynamic Systems: with Petri Nets and Other Tools
Modeling and Control of Discrete-event Dynamic Systems: with Petri Nets and Other Tools

This book presents results of research achieved in friendly collaboration across borders and moreover between continents and emphasizes a belief in engineering science being for the benefit of mankind the world over. This aspect of the book’s ethos is epitomized by the authors’ profiles, one being from Central Europe and...

Making, Breaking Codes: Introduction to Cryptology
Making, Breaking Codes: Introduction to Cryptology

This book is an introduction to modern ideas in cryptology and how to employ these ideas. It includes the relevant material on number theory, probability, and abstract algebra, in addition to descriptions of ideas about algorithms and com plexity theory. Three somewhat different terms appear in the discussion of secure communications...

Introduction to Automata Theory, Languages and Computation (Addison-Wesley series in computer science)
Introduction to Automata Theory, Languages and Computation (Addison-Wesley series in computer science)

Ten years ago the authors undertook to produce a book covering the known material on formal languages, automata theory, and computational complexity. In retrospect, only a few significant results were overlooked in the 237 pages. In writing a new book on the subject, we find the field has expanded in so many new directions that a...

CMS Security Handbook: The Comprehensive Guide for WordPress, Joomla, Drupal, and Plone
CMS Security Handbook: The Comprehensive Guide for WordPress, Joomla, Drupal, and Plone

As a business owner, you are probably faced with hundreds of decisions that must be made weekly. Diving headlong into a technical effort might be scary. Diving into a security and operations effort is something you likely don't know how to do.

That's where this book comes in. This book helps you fill in the blanks for...

Algorithmic Randomness and Complexity (Theory and Applications of Computability)
Algorithmic Randomness and Complexity (Theory and Applications of Computability)

Though we did not know it at the time, this book’s genesis began with the arrival of Cris Calude in New Zealand. Cris has always had an intense interest in algorithmic information theory. The event that led to much of the recent research presented here was the articulation by Cris of a seemingly innocuous question. This question...

Result Page: 450 449 448 447 446 445 444 443 442 441 440 439 438 437 436 435 434 433 432 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy