Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Creativity Across Domains: Faces of the Muse
Creativity Across Domains: Faces of the Muse
Creativity Across Domains: Faces of the Muse sorts through the sometimes-confusing theoretical diversity that domain specificity has spawned. It also brings together writers who have studied creative thinkers in different areas, such as the various arts, sciences, and communication/leadership. Each contributor explains what is known about the...
Applied Software Measurement
Applied Software Measurement

Effectively forecast, manage, and control software across the entire project lifecycle

Accurately size, estimate, and administer software projects with real-world guidance from an industry expert. Fully updated to cover the latest tools and techniques, Applied Software Measurement, Third Edition details how to...

Handbook of Optics, Third Edition Volume II: Design, Fabrication and Testing, Sources and Detectors, Radiometry and Photometry
Handbook of Optics, Third Edition Volume II: Design, Fabrication and Testing, Sources and Detectors, Radiometry and Photometry

The most comprehensive and up-to-date optics resource available

Prepared under the auspices of the Optical Society of America, the five carefully architected and cross-referenced volumes of the Handbook of Optics, Third Edition, contain everything a student, scientist, or engineer requires to actively work in...

Quantum Computer Science (Synthesis Lectures on Quantum Computing)
Quantum Computer Science (Synthesis Lectures on Quantum Computing)
In this text we present a technical overview of the emerging field of quantum computation along with new research results by the authors. What distinguishes our presentation from that of others is our focus on the relationship between quantum computation and computer science. Specifically, our emphasis is on the computational model of quantum...
Digital Watermarking and Steganography, 2nd Ed. (The Morgan Kaufmann Series in Multimedia Information and Systems)
Digital Watermarking and Steganography, 2nd Ed. (The Morgan Kaufmann Series in Multimedia Information and Systems)
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties...
Hardware Hacking Projects for Geeks
Hardware Hacking Projects for Geeks

Put a hacker in a room with a Furby for a weekend and you'll hear a conversation that's fairly one-sided in its originality. Toss in an 802.11b network card, a soldering iron, wire cutters, a logic probe, and a few other carefully selected tools and materials and you'll have potential. Add a copy of Hardware Hacking Projects for...

TensorFlow Machine Learning Cookbook: Over 60 recipes to build intelligent machine learning systems with the power of Python, 2nd Edition
TensorFlow Machine Learning Cookbook: Over 60 recipes to build intelligent machine learning systems with the power of Python, 2nd Edition

Skip the theory and get the most out of Tensorflow to build production-ready machine learning models

Key Features

  • Exploit the features of Tensorflow to build and deploy machine learning models
  • Train neural networks to tackle real-world problems in Computer Vision and...
Advanced Statistical Steganalysis (Information Security and Cryptography)
Advanced Statistical Steganalysis (Information Security and Cryptography)

Steganography and steganalysis, the hiding and detection of a covert payload within an innocent cover object, started to receive attention from the computer science, engineering, and mathematics communities in the 1990s. At first the problems were not clearly defined, but proper statistical foundations were proposed and mathematical...

JBoss Administration and Development, Second Edition
JBoss Administration and Development, Second Edition
The primary focus of this book is the presentation of the standard JBoss 3.0.3 architecture components from both the perspective of their configuration and architecture. As a user of a standard JBoss distribution you will be given an understanding of how to configure the standard components.

As a JBoss developer, you will be given a good
...
Random Curves: Journeys of a Mathematician
Random Curves: Journeys of a Mathematician
These autobiographical memoirs of Neal Koblitz, coinventor of one of the two most popular forms of encryption and digital signature, cover many topics besides his own personal career in mathematics and cryptography - travels to the Soviet Union, Latin America, Vietnam and elsewhere, political activism, and academic controversies relating to math...
Neural Networks and Pattern Recognition
Neural Networks and Pattern Recognition
This book is one of the most up-to-date and cutting-edge texts available on the rapidly growing application area of neural networks. Neural Networks and Pattern Recognition focuses on the use of neural networksin pattern recognition, a very important application area for neural networks technology. The contributors are widely known...
Foundations of Soft Case-Based Reasoning (Wiley Series on Intelligent Systems)
Foundations of Soft Case-Based Reasoning (Wiley Series on Intelligent Systems)
A breakthrough on today’s fastest growing artificial intelligence technique

Many of today’s engineering and business computer applications require decisions to be made on the basis of uncertain or incomplete information, a phenomenon that has resulted in the development of case-based reasoning, a powerful computing technique by...

unlimited object storage image
Result Page: 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy