Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Character of Physical Law (Messenger Lectures, 1964)
The Character of Physical Law (Messenger Lectures, 1964)

In these Messenger Lectures, originally delivered at Cornell University and recorded for television by the BBC, Richard Feynman offers an overview of selected physical laws and gathers their common features into one broad principle of invariance. He maintains at the outset that the importance of a physical law is not "how clever...

Post-mining of Association Rules: Techniques for Effective Knowledge Extraction
Post-mining of Association Rules: Techniques for Effective Knowledge Extraction

Since its introduction for market basket analysis in the early 1990s, association rule mining has had a lot of research attention, and it is now widely used in many fields, for example in retail, telecom, insurance, and bioinformatics applications.

One familiar problem encountered in association mining exercises is that they...

Murach's Oracle SQL and PL/SQL (Training & Reference)
Murach's Oracle SQL and PL/SQL (Training & Reference)

If you're developing applications that access Oracle databases, you can save time and work by having SQL do more of the data handling for you: This new book shows you how. It teaches you how to create effective SQL queries to extract and update the data in an Oracle database. It teaches you how to design and implement a database, giving...

OpenCL in Action: How to Accelerate Graphics and Computations
OpenCL in Action: How to Accelerate Graphics and Computations
In the summer of 1997, I was terrified. Instead of working as an intern in my major (microelectronic engineering), the best job I could find was at a research laboratory devoted to high-speed signal processing. My job was to program the two-dimensional fast Fourier transform (FFT) using C and the Message Passing Interface...
Raspberry Pi Hacks: Tips & Tools for Making Things with the Inexpensive Linux Computer
Raspberry Pi Hacks: Tips & Tools for Making Things with the Inexpensive Linux Computer

With more than 60 practical and creative hacks, this book helps you turn Raspberry Pi into the centerpiece of some cool electronics projects. Want to create a controller for a camera or a robot? Set up Linux distributions for media centers or PBX phone systems? That’s just the beginning of what you’ll find inside...

Handbook of Global Logistics: Transportation in International Supply Chains
Handbook of Global Logistics: Transportation in International Supply Chains

Global logistics entails tradeoffs in facility location, distribution networks, the routing and scheduling of deliveries by different modes of travel (e.g., air, water, truck, rail), procurement, and the overall management of international supply chains. In an increasingly global economy, then, logistics has become a very important matter in...

JBoss EAP6 High Availability
JBoss EAP6 High Availability

From the basic uses of JBoss EAP6 through to advanced clustering techniques, this book is the perfect way to learn how to achieve a system designed for high availability. All that's required is some basic knowledge of Linux/Unix.

Overview

  • A thorough introduction to the new domain mode provided by...
Building Products for the Enterprise: Product Management in Enterprise Software
Building Products for the Enterprise: Product Management in Enterprise Software

If you’re new to software product management or just want to learn more about it, there’s plenty of advice available—but most of it is geared toward consumer products. Creating high-quality software for the enterprise involves a much different set of challenges. In this practical book, two expert product managers...

Apache Hive Essentials: Essential techniques to help you process, and get unique insights from, big data, 2nd Edition
Apache Hive Essentials: Essential techniques to help you process, and get unique insights from, big data, 2nd Edition

This book takes you on a fantastic journey to discover the attributes of big data using Apache Hive.

Key Features

  • Grasp the skills needed to write efficient Hive queries to analyze the Big Data
  • Discover how Hive can coexist and work with other tools within the Hadoop...
Kerberos: The Definitive Guide
Kerberos: The Definitive Guide
Kerberos is a sophisticated network authentication system—one that has been publicly available since 1989 and provides that eternal holy grail of network administrators, single-sign-on. Yet, in that intervening decade, documentation on Kerberos has been notably lacking. While many large organizations and academic institutions have enjoyed the...
Buliding N1™ Grid Solutions Preparing, Architecting, and Implementing Service-Centric Data Centers (Official Sun Microsystems Resource)
Buliding N1™ Grid Solutions Preparing, Architecting, and Implementing Service-Centric Data Centers (Official Sun Microsystems Resource)

The N1 Grid is Sun's vision, strategy, and architecture—and a set of products—that redefine the nature of data center computing. The N1 Grid architecture uses the network, physically and logically, as its fundamental organizing principle.

This book enables the reader to implement service-centric data center solutions through...

Data Mining Methods and Models
Data Mining Methods and Models
Apply powerful Data Mining Methods and Models to Leverage your Data for Actionable Results

Data Mining Methods and Models provides:

  • The latest techniques for uncovering hidden nuggets of information
  • The insight into how the data mining algorithms actually work
  • The hands-on experience of...
unlimited object storage image
Result Page: 402 401 400 399 398 397 396 395 394 393 392 391 390 389 388 387 386 385 384 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy