Home | Amazing | Today | Tags | Publishers | Years | Search 
An Introduction to Support Vector Machines and Other Kernel-based Learning Methods
An Introduction to Support Vector Machines and Other Kernel-based Learning Methods

This is the first comprehensive introduction to Support Vector Machines (SVMs), a new generation learning system based on recent advances in statistical learning theory. SVMs deliver state-of-the-art performance in real-world applications such as text categorisation, hand-written character recognition, image classification, biosequences...

Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition

There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter.

If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the...

Adobe Photoshop CS5 for Photographers: A professional image editor's guide to the creative use of Photoshop for the Macintosh and PC
Adobe Photoshop CS5 for Photographers: A professional image editor's guide to the creative use of Photoshop for the Macintosh and PC

When I fi rst started using Photoshop, it was a much simpler program to get to grips with compared with what we see today. Since then Adobe Photoshop CS5 has evolved to supply photographers with all the tools they need. My aim is to provide you with a working photographer’s perspective of what Photoshop CS5 can do and how to...

Data Integration Blueprint and Modeling: Techniques for a Scalable and Sustainable Architecture
Data Integration Blueprint and Modeling: Techniques for a Scalable and Sustainable Architecture

Making Data Integration Work: How to Systematically Reduce Cost, Improve Quality, and Enhance Effectiveness

 

Today’s enterprises are investing massive resources in data integration. Many possess thousands of point-to-point data...

Rigorous Software Development: An Introduction to Program Verification
Rigorous Software Development: An Introduction to Program Verification

This book is about the use of techniques and tools for the design and implementation of computer systems and software that are free from logical or functional flaws (in the sense of functional requirements). The word rigorous in the title of this book is justified by the fact that the arguments for such fault freeness have their roots...

Group Theoretical Methods in Image Processing (Lecture Notes in Computer Science)
Group Theoretical Methods in Image Processing (Lecture Notes in Computer Science)

These Lecture Notes are based on a series of lectures I gave at the Linkoping University Department of Electrical Engineering in 1988. In these lectures 1 tried to give an overview of the theory of representation of compact groups and some applications in the fields of image science and pattern recognition.

The participants...

Fundamentals of Python: From First Programs through Data Structures
Fundamentals of Python: From First Programs through Data Structures

Welcome to Fundamentals of Python. This text is intended for a complete, firstyear study of programming and problem-solving. It covers the material taught in typical Computer Science 1 and Computer Science 2 courses (CS1 and CS2) at the undergraduate level.

In FUNDAMENTALS OF PYTHON: FROM FIRST PROGRAMS THROUGH DATA...

An Implementation Guide to Compiler Writing
An Implementation Guide to Compiler Writing

An important aspect of teaching a course in compiler writing is to illustrate the key theoretical concepts normally taught in such a course. A frequently used strategy for achieving this goal is to have a student design a simple programming language and implement a compiler for this language. Many texts in compiler writing do not,...

A Unified Approach to Interior Point Algorithms for Linear Complementarity Problems
A Unified Approach to Interior Point Algorithms for Linear Complementarity Problems

The recent remarkable developments of interior point algorithms began in 1984 with Karmarkar's polynomial-time interior point algorithm for linear programs using a log- arithmic potential function and a projective transformation. The progress has been made so rapidly and extensively that it seems difficult to get a comprehensive...

Applied Algebra: Codes, Ciphers and Discrete Algorithms, Second Edition (Discrete Mathematics and Its Applications)
Applied Algebra: Codes, Ciphers and Discrete Algorithms, Second Edition (Discrete Mathematics and Its Applications)

Using mathematical tools from number theory and finite fields, Applied Algebra: Codes, Ciphers, and Discrete Algorithms, Second Edition presents practical methods for solving problems in data security and data integrity. It is designed for an applied algebra course for students who have had prior classes in abstract or linear...

Microsoft Word 2010 Complete
Microsoft Word 2010 Complete

Microsoft Word 2010 Complete, part of the Origins Series, provides a thorough introduction of Microsoft Word 2010 skills to beginning learners. This text includes features that make learning easy and enjoyable, yet challenging for students. Students will be engaged with activities that range from simulations to case studies that challenge and...

New Perspectives on Microsoft Access 2010, Brief (New Perspectives Series)
New Perspectives on Microsoft Access 2010, Brief (New Perspectives Series)

The New Perspectives Series’ critical-thinking, problem-solving approach is the ideal way to prepare students to transcend point-and-click skills and take advantage of all that Microsoft Office 2010 has to offer.

In developing the New Perspectives Series, our goal was to create books that give students the software...

Result Page: 320 319 318 317 316 315 314 313 312 311 310 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy