Home | Amazing | Today | Tags | Publishers | Years | Search 
An Introduction to MultiAgent Systems
An Introduction to MultiAgent Systems

Multiagent systems are systems composed of multiple interacting computing elements, known as agents. Agents are computer systems with two important capabilities. First, they are at least to some extent capable of autonomous action - of deciding for themselves what they need to do in order to satisfy their design objectives. Second, they are...

Handbook of Face Recognition
Handbook of Face Recognition

Face recognition has a large number of applications, including security, person verification, Internet communication, and computer entertainment. Although research in automatic face recognition has been conducted since the 1960s, this problem is still largely unsolved. Recent years have seen significant progress in this area owing to advances...

Foundations of Python Network Programming: The comprehensive guide to building network applications with Python
Foundations of Python Network Programming: The comprehensive guide to building network applications with Python

This second edition of Foundations of Python Network Programming targets Python 2.5 through Python 2.7, the most popular production versions of the language. Python has made great strides since Apress released the first edition of this book back in the days of Python 2.3. The advances required new chapters to be written from the ground up,...

Business Process Technology: A Unified View on Business Processes, Workflows and Enterprise Applications
Business Process Technology: A Unified View on Business Processes, Workflows and Enterprise Applications

In the last decade there has been an explosion of interest in the modeling and automation of business processes, and competence in this area is seen as increasingly critical to business competitiveness and stability. However, this has lead to a parallel explosion in solution approaches and technologies leading to a state-of-the-art that is...

ModSecurity Handbook
ModSecurity Handbook

ModSecurity Handbook is the definitive guide to ModSecurity, a popular open source web application firewall. Written by Ivan Ristic, who designed and wrote much of ModSecurity, this book will teach you everything you need to know to monitor the activity on your web sites and protect them from attack. Situated between your web sites and the...

vi and Vim Editors Pocket Reference: Support for every text editing task
vi and Vim Editors Pocket Reference: Support for every text editing task

Many Unix, Linux, and Mac OS X geeks enjoy using the powerful, platform-agnostic text editors vi and Vim, but there are far too many commands for anyone to remember. Author Arnold Robbins has chosen the most valuable commands for vi, Vim, and vi's main clones—vile, elvis, and nvi—and packed them into this...

JavaScript Step by Step
JavaScript Step by Step

Much has changed since the first edition of JavaScript Step by Step was written in 2007. The underlying JavaScript specification received a major update; Microsoft released Windows Internet Explorer 8—and now 9 (which is about to be released as I write this); JavaScript development frameworks have matured and are now ubiquitous; and...

Biometric Recognition: Challenges and Opportunities
Biometric Recognition: Challenges and Opportunities

Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric...

Z-80 Microprocessor: Architecture, Interfacing, Programming and Design
Z-80 Microprocessor: Architecture, Interfacing, Programming and Design

This text is intended for microprocessor courses at the undergraduate level in technology and engineering. ll is a comprehensive treatment of the microprocessor. covering both hardware and software based on the Z80 microprocessor family. The text assumes a course in digital logic as a prerequisite; however, it does not assume a background in...

Wavelet Theory and Its Application to Pattern Recognition (Series in Machine Perception and Artificial Intelligence)
Wavelet Theory and Its Application to Pattern Recognition (Series in Machine Perception and Artificial Intelligence)

This 2nd edition is an update of the book "Wavelet Theory and Its Application to Pattern Recognition" published in 2000. Three new chapters, which are research results conducted during 2001-2008, will be added. The book consists of two parts - the first contains the basic theory of wavelet analysis and the second includes...

Data Mining on Multimedia Data (Lecture Notes in Computer Science)
Data Mining on Multimedia Data (Lecture Notes in Computer Science)

The increasing use of computer technology in many areas of economic, scientific, and social life is resulting in large collections of digital data. The amount of data which is created on and stored in computers is growing from day to day. Electronic database facilities are common everywhere and can now be considered a standard technology....

WSH and ADSI Administrative Scripting
WSH and ADSI Administrative Scripting

This book is intended to help you, the network administrator, make your job somewhat easier by teaching you to script and automate many of your administrative tasks. As you are well aware, mundane chores such as adding user, group, and computer accounts take more time than they should. The tasks of mapping network shares and creating login...

Result Page: 349 348 347 346 345 344 343 342 341 340 339 338 337 336 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy