|
|
|
|
Ecological Modeling for Resource Management
This book was developed from a workshop on the “Effective Use of
Ecological Modeling in Management,” held in Oak Ridge, Tennessee,
on October 23–26, 2000. The workshop was sponsored by the Department
of Defense’s (DoD’s) Strategic Environmental Research and Development
Program (SERDP), the Army Research... | | Grading Knowledge: Extracting Degree Information from Texts
If you are sitting in a basement room without a view — not to mention the
bars in front of the windows — and writing a book, then you better have
good company. I had the best company you could imagine. Waltraud Hiltl,
Katja Markert, Martin Romacker, Klemens Schnattinger, Andreas Klee and I
shared very little office... | | Getting Started with Meteor.js JavaScript Framework
Creating the most modern, dynamic, multi-user web applications quickly and easily is exactly what Meteor was designed for – and it’s all done in JavaScript. In this tutorial is everything you need to know to get started.
Overview
-
Create dynamic, multi-user web applications completely in...
|
|
|
| | Security Assessment: Case Studies for Implementing the NSA IAMThe National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or... | | The Distance Education Evolution: Issues and Case StudiesThe Distance Education Evolution: Case Studies addresses issues regarding the development and design of online courses, and the implementation and evaluation of an online learning program. Several chapters include design strategies for online courses that range from the specific to the universal. Many authors address pedagogical issues from both a... |
|
Bayesian Networks and Influence Diagrams: A Guide to Construction and Analysis (Information Science and Statistics)Probabilistic networks, also known as Bayesian networks and influence diagrams, have become one of the most promising technologies in the area of applied artificial intelligence, offering intuitive, efficient, and reliable methods for diagnosis, prediction, decision making, classification, troubleshooting, and data mining under uncertainty.... | | Best Practices in Business Technology ManagementA Tour de Force of Business Technology Management
Despite the exponential growth of computing and communications technology, the inertia of old business technology management practices still drives most investment decisions in this area. Companies spend too much money on new technology, while their business models and... | | Graph Transformations and Model-Driven Engineering
This festschrift volume, published in honor of Manfred Nagl on the occasion of his 65th birthday, contains 30 refereed contributions, edited by five of his academic descendants. The types of papers vary significantly, including classic research papers in the style of journal articles, surveys of focused research areas, essays reflecting on... |
|
|
Result Page: 302 301 300 299 298 297 296 295 294 293 292 291 290 289 288 287 286 285 284 |