Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Graph Theory, Combinatorics and Algorithms: Interdisciplinary Applications (Operations Research / Computer Science Interfaces Series)
Graph Theory, Combinatorics and Algorithms: Interdisciplinary Applications (Operations Research / Computer Science Interfaces Series)

Graph Theory, Combinatorics and Algorithms: Interdisciplinary Applications focuses on discrete mathematics and combinatorial algorithms interacting with real world problems in computer science, operations research, applied mathematics and engineering. The book contains eleven chapters written by...

Project Managers at Work
Project Managers at Work

Read 25 in-depth, candid interviews with notable project managers. Discover how project managers work, what they do, how they adapt and make decisions, how they inspire and motivate others, what career lessons and advice they can share, and how they landed their current jobs either as project managers or in more senior positions thanks to...

Pattern-Oriented Software Architecture, Patterns for Resource Management (Wiley Software Patterns Series)
Pattern-Oriented Software Architecture, Patterns for Resource Management (Wiley Software Patterns Series)

This is a book about patterns for resource management in software systems. The patterns provide solutions for problems that are typically encountered by software architects and developers when trying to provide an effective and efficient means of managing resources in a software system. Efficient management of resources is critical in the...

Core Concepts in Data Analysis: Summarization, Correlation and Visualization
Core Concepts in Data Analysis: Summarization, Correlation and Visualization

In this textbook, I take an unconventional approach to data analysis. Its contents are heavily influenced by the idea that data analysis should help in enhancing and augmenting knowledge of the domain as represented by the concepts and statements of relation between them. According to this view, two main pathways for data analysis are...

Information Security Science: Measuring the Vulnerability to Data Compromises
Information Security Science: Measuring the Vulnerability to Data Compromises

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically...

The Internet of Things in the Cloud: A Middleware Perspective
The Internet of Things in the Cloud: A Middleware Perspective

Although the Internet of Things (IoT) is a vast and dynamic territory that is evolving rapidly, there has been a need for a book that offers a holistic view of the technologies and applications of the entire IoT spectrum. Filling this void, The Internet of Things in the Cloud: A Middleware Perspective provides a comprehensive...

Medical Image Processing, Reconstruction and Restoration: Concepts and Methods
Medical Image Processing, Reconstruction and Restoration: Concepts and Methods

Medical imaging is specific in that it concerns internal structures of organisms that are inaccessible to common imaging methods and that the imaging results are observed, evaluated, and classified mostly by non-technical staff. Development of new image processing methods and the interpretation of complicated or unexpected results require deep...

Mastering Machine Learning With scikit-learn
Mastering Machine Learning With scikit-learn

Apply effective learning algorithms to real-world problems using scikit-learn

About This Book

  • Design and troubleshoot machine learning systems for common tasks including regression, classification, and clustering
  • Acquaint yourself with popular machine learning algorithms, including...
Mobile Robots: The Evolutionary Approach (Studies in Computational Intelligence)
Mobile Robots: The Evolutionary Approach (Studies in Computational Intelligence)
The design and control of autonomous intelligent mobile robotic systems operating in unstructured changing environments includes many objective difficulties. There are several studies about the ways in which, robots exhibiting some degree of autonomy, adapt themselves to fit in their environments. The application and use of bio-inspired and...
Advanced Engineering Mathematics
Advanced Engineering Mathematics

Through previous editions, Peter O'Neil has made rigorous engineering mathematics topics accessible to thousands of students by emphasizing visuals, numerous examples, and interesting mathematical models. Advanced Engineering Mathematics features a greater number of examples and problems and is fine-tuned throughout to improve the clear...

An Introduction to Object Recognition: Selected Algorithms for a Wide Variety of Applications
An Introduction to Object Recognition: Selected Algorithms for a Wide Variety of Applications

Rapid development of computer hardware has enabled usage of automatic object recognition in an increasing number of applications, ranging from industrial image processing to medical applications, as well as tasks triggered by the widespread use of the internet. Each area of application has its specific requirements, and consequently these...

Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers (Embedded Technology)
Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers (Embedded Technology)
Wireless networking is poised to have a massive impact on communications, and the 802.11 standard is to wireless networking what Ethernet is to wired networking. There are already over 50 million devices using the dominant IEEE 802.11 (essentially wireless Ethernet) standard, with astronomical growth predicted over the next 10 years. New...
Result Page: 51 50 49 48 47 46 45 44 43 42 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy