Home | Amazing | Today | Tags | Publishers | Years | Search 
Beginning Android Tablet Application Development (Wrox Programmer to Programmer)
Beginning Android Tablet Application Development (Wrox Programmer to Programmer)

I FIRST STARTED PLAYING WITH THE ANDROID SDK before it was offi cially released as a 1.0 release. Back then, the tools were unpolished, the APIs in the SDK were unstable, and the documentation was sparse. Fast forward two and a half years, Android is now a formidable mobile operating system, with a following no less impressive that the...

Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data (Data-Centric Systems and Applications)
Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data (Data-Centric Systems and Applications)

The rapid growth of the Web in the past two decades has made it the largest publicly accessible data source in the world. Web mining aims to discover useful information or knowledge from Web hyperlinks, page contents, and usage logs. Based on the primary kinds of data used in the mining process, Web mining tasks can be categorized...

Mac OS X: The Complete Reference
Mac OS X: The Complete Reference

This book is complete: my checklists and FileMaker databases have cross-indexed features, preferences, and the applications that ship with Mac OS X, to make certain that everything shows up somewhere in the book. It has been revised against the second update—Mac OS X 10.0.2. We have tried to include screen shots of almost every feature,...

Simulated Annealing and Boltzmann Machines: A Stochastic Approach to Combinatorial Optimization and Neural Computing
Simulated Annealing and Boltzmann Machines: A Stochastic Approach to Combinatorial Optimization and Neural Computing

Wiley-Interscience Series in Discrete Mathematics and Optimization Advisory Editors Ronald L. Graham Jan Karel Lenstra Robert E. Tarjan Discrete Mathematics and Optimization involves the study of finite structures. It is one of the fastest growing areas in mathematics today. The level and depth of recent advances in the area and the wide...

Scientific Data Mining and Knowledge Discovery: Principles and Foundations
Scientific Data Mining and Knowledge Discovery: Principles and Foundations

This book suits both graduate students and researchers with a focus on discovering knowledge from scientific data. The use of computational power for data analysis and knowledge discovery in scientific disciplines has found its roots with the revolution of high-performance computing systems. Computational science in physics,...

Creative After Effects 7: Workflow Techniques for Animation, Visual Effects and Motion Graphics
Creative After Effects 7: Workflow Techniques for Animation, Visual Effects and Motion Graphics

I have spent the past ten years getting to know After Effects like a good friend; using it for my own creative work as animator, visual effects and motion graphic designer for television and film. I have used many software applications in my time but none of them compare, in terms of creative flexibility and sheer depth to Adobe...

Time-Saver Standards for Architectural Design Data
Time-Saver Standards for Architectural Design Data

In preparing this the Seventh edition, the first revision in more than a dozen years, the editors were challenged in many respects. This is evident in the fact that the volume has been almost entirely rewritten, with new articles by over eighty authors. It is also evident in its new format and contents, expanded to include...

Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2011, Beijing, China, July 9, 2011
Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2011, Beijing, China, July 9, 2011

concerned with the study of the development and use of advanced information technologies and systems for national, international, and societal security-related applications. In the past few years,we have witnessed that ISI experienced tremendous growth and attracted significant interest involving academic researchers in related fields...

Knowledge Processing and Data Analysis: First International Conference, KONT 2007, Novosibirsk, Russia
Knowledge Processing and Data Analysis: First International Conference, KONT 2007, Novosibirsk, Russia

This volume collects the proceedings of two related international conferences on foundations and practical applications of mathematical methods of data analysis, of Formal Concept Analysis and of methods for information extraction from natural language texts. The first conference, named Knowledge - Ontology - Theory 2007 (KONT 2007),...

Studies in Complexity and Cryptography: Miscellanea on the Interplay between Randomness and Computation
Studies in Complexity and Cryptography: Miscellanea on the Interplay between Randomness and Computation

This volume contains a collection of studies in the areas of complexity theory and foundations of cryptography. These studies were conducted at different times during the last couple of decades. Although many of these studies have been referred to by other works, none of them was formally published before.

Indeed, this volume...

HTML5: The Missing Manual
HTML5: The Missing Manual

At first glance, you might assume that HTML5 is the fifth version of the HTML web-page-writing language. But the real story is a whole lot messier.

HTML5 is a rebel. It was dreamt up by a loose group of freethinkers who weren’t in charge of the official HTML standard. It allows page-writing practices that...

Numerical Analysis Using MATLAB and Spreadsheets: Second Edition
Numerical Analysis Using MATLAB and Spreadsheets: Second Edition

Numerical analysis is the branch of mathematics that is used to find approximations to difficult problems such as finding the roots of non-linear equations, integration involving complex expressions and solving differential equations for which analytical solutions do not exist. It is applied to a wide variety of disciplines such as...

Result Page: 322 321 320 319 318 317 316 315 314 313 312 311 310 309 308 307 306 305 304 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy