Home | Amazing | Today | Tags | Publishers | Years | Search 
Applying Computational Intelligence: How to Create Value
Applying Computational Intelligence: How to Create Value

The flow of academic ideas in the area of computational intelligence is impacting industrial practice at considerable speed. Practitioners face the challenge of tracking, understanding and applying the latest techniques, which often prove their value even before the underlying theories are fully understood. This book offers realistic guidelines...

Implementing Quality in Laboratory Policies and Processes: Using Templates, Project Management, and Six Sigma
Implementing Quality in Laboratory Policies and Processes: Using Templates, Project Management, and Six Sigma

The credibility of a laboratory’s reputation is directly affected by its quality assurance program. The key to a successful quality assurance program is the manuals, and associated documents define the program and its various components. Therefore, by extension, a laboratory’s credibility is directly related to its operational and...

Functional Group Chemistry (Tutorial Chemistry Texts)
Functional Group Chemistry (Tutorial Chemistry Texts)

Functional Group Chemistry presents the chemistry of functional groups with an emphasis on patterns of reactivity, the consequences of the relative electronegativity of the atoms that constitute functional groups, the role of lone pairs and the stereochemistry of reactions at a particular group. The material is presented in four chapters. The...

Smart Data: Enterprise Performance Optimization Strategy
Smart Data: Enterprise Performance Optimization Strategy

This book is written for enterprise executives and addresses the single most important activity for which they are ultimately responsible—optimization of performance. Whether you are an executive of government or commercial enterprise, or any other organization, your primary aim is to maximize return from limited resources to accomplish...

Efficient Secure Two-Party Protocols: Techniques and Constructions (Information Security and Cryptography)
Efficient Secure Two-Party Protocols: Techniques and Constructions (Information Security and Cryptography)

The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation – both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them...

Testing Complex and Embedded Systems
Testing Complex and Embedded Systems

Many enterprises regard system-level testing as the final piece of the development effort, rather than as a tool that should be integrated throughout the development process. As a consequence, test teams often execute critical test plans just before product launch, resulting in much of the corrective work being performed in a rush and at the...

CMMI for Development®: Guidelines for Process Integration and Product Improvement (3rd Edition)
CMMI for Development®: Guidelines for Process Integration and Product Improvement (3rd Edition)

CMMI® for Development (CMMI-DEV) describes best practices for the development and maintenance of products and services across their lifecycle. By integrating essential bodies of knowledge, CMMI-DEV provides a single, comprehensive framework for organizations to assess their development and maintenance processes and...

Eliminating Waste in Business: Run Lean, Boost Profitability
Eliminating Waste in Business: Run Lean, Boost Profitability

Redundant employees. Storerooms full of extra stock "in case we need it." Marketing money sprayed in all directions in the vain hope it will create customers. Duplicate IT systems. HR policies that fatten the corporate waistline rather than keeping it trim. Budgeting exercises that result in "more of the same, plus...

Introduction to Probability and Stochastic Processes with Applications
Introduction to Probability and Stochastic Processes with Applications

An easily accessible, real-world approach to probability and stochastic processes

Introduction to Probability and Stochastic Processes with Applications presents a clear, easy-to-understand treatment of probability and stochastic processes, providing readers with a solid foundation they can build upon throughout their...

Delta-Sigma A/D-Converters: Practical Design for Communication Systems (Springer Series in Advanced Microelectronics)
Delta-Sigma A/D-Converters: Practical Design for Communication Systems (Springer Series in Advanced Microelectronics)

The emphasis of this book is on practical design aspects for broadband A/D converters for communication systems. The embedded designs are employed for transceivers in the field of ADSL solutions and WLAN applications. An area- and power-efficient realization of a converter is mandatory to remain competitive in the market. The right choice for...

Business Process Change, Third Edition (The MK/OMG Press)
Business Process Change, Third Edition (The MK/OMG Press)

Business Process Change, 3rd Edition provides a balanced view of the field of business process change. Bestselling author Paul Harmon offers concepts, methods, cases for all aspects and phases of successful business process improvement. Updated and added for this edition is new material on the development of business models...

System Requirements Analysis, Second Edition
System Requirements Analysis, Second Edition

System Requirements Analysis gives the professional systems engineer the tools to set up a proper and effective analysis of the resources, schedules and parts needed to successfully undertake and complete any large, complex project. This fully revised text offers readers the methods for rationally breaking down a large project into a...

Result Page: 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy