Home | Amazing | Today | Tags | Publishers | Years | Search 
The Cambridge Handbook of Information and Computer Ethics
The Cambridge Handbook of Information and Computer Ethics

Information and Communication Technologies (ICTs) have profoundly changed many aspects of life, including the nature of entertainment, work, communication, education, healthcare, industrial production and business, social relations and conflicts. They have had a radical and widespread impact on our moral lives and hence on contemporary...

Gods and Goddesses in Greek Mythology
Gods and Goddesses in Greek Mythology

The word myth comes from the Greek word mythos, which means “story” or “speech.”1 Myth is often the word used to describe a story that explains events or objects that occur in nature, such as the creation of certain flowers or animals, the location of deserts or oceans, and even the origin and cycle of the seasons....

Neural Systems for Control
Neural Systems for Control

Control problems offer an industrially important application and a guide to understanding control systems for those working in Neural Networks. Neural Systems for Control represents the most up-to-date developments in the rapidly growing aplication area of neural networks and focuses on research in natural and artifical neural systems...

English Grammar for Dummies
English Grammar for Dummies

A few years ago, a magazine sponsored a contest for the comment most likely to end a conversation. The winning entry? "I teach English grammar." Just throw that line out at a party; everyone around you will clam up or start saying "whom."

Why does grammar make everyone so nervous? Probably because English...

Hackers and Painters: Big Ideas from the Computer Age
Hackers and Painters: Big Ideas from the Computer Age

"The computer world is like an intellectual Wild West, in which you can shoot anyone you wish with your ideas, if you're willing to risk the consequences. "
--from Hackers & Painters: Big Ideas from the Computer Age, by Paul Graham

We are living in the computer age, in a world increasingly designed and...

Complex Networks: Second International Workshop, CompleNet 2010, Rio de Janeiro, Brazil, October 13-15, 2010
Complex Networks: Second International Workshop, CompleNet 2010, Rio de Janeiro, Brazil, October 13-15, 2010
The International Workshop on Complex Networks—CompleNet (www.complenet.org)—was initially proposed in 2008 with the first workshop taking place in 2009. The initiative was the result of efforts from researchers from the Bio-Complex Laboratory in the Department of Computer Sciences at Florida Institute of...
iPhone: The Missing Manual
iPhone: The Missing Manual
How do you make the point that the iPhone has changed the world? The easy answer is “use statistics”—100 million sold, 500,000 downloadable programs on the iPhone A pp Store, 15 billion downloads…. Trouble is, those statistics get stale almost before you’ve finished typing them....
iPhone Location Aware Apps by Example: Beginners Guide
iPhone Location Aware Apps by Example: Beginners Guide
iPhone Location Aware Apps Beginner's Guide is probably the first book from any technical publisher that teaches you to build real world applications (five of them). That's a bold step from PacktPub - by undertaking more lively practical examples, rather than 400 pages of text! The book lays emphasis on location services, due to the...
Embedded Signal Processing with the Micro Signal Architecture
Embedded Signal Processing with the Micro Signal Architecture
Embedded systems are usually part of larger and complex systems and are usually implemented on dedicated hardware with associated software to form a computational engine that will effi ciently perform a specifi c function. The dedicated hardware (or embedded processor) with the associated software is embedded into many...
Bayesian Reasoning and Machine Learning
Bayesian Reasoning and Machine Learning
We live in a world that is rich in data, ever increasing in scale. This data comes from many di erent sources in science (bioinformatics, astronomy, physics, environmental monitoring) and commerce (customer databases, nancial transactions, engine monitoring, speech recognition, surveillance, search). Possessing the knowledge as to...
Pattern Recognition and Image Preprocessing (Electrical and Computer Engineering)
Pattern Recognition and Image Preprocessing (Electrical and Computer Engineering)

This book is based in part on my earlier work. Pattern Recognition: Applications to Large Data-Set Problems, published by Marcel Dekker: Inc. in 1984. It was originally intended that this volume be a second editon of that work. However, due to the tremendous amount of material added it seemed that a new title. Pattern Recognition...

Methods for Mining and Summarizing Text Conversations (Synthesis Lecture on Data Management)
Methods for Mining and Summarizing Text Conversations (Synthesis Lecture on Data Management)

Before the invention of the Internet and the creation of the Web, the vast majority of human conversations were in spoken form, with the only notable, but extremely limited, exception being epistolary exchanges. Some important spoken conversations, such as criminal trials and political debates (e.g., Hansard, the transcripts of...

Result Page: 36 35 34 33 32 31 30 29 28 27 26 25 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy