Home | Amazing | Today | Tags | Publishers | Years | Search 
Automating the Design of Data Mining Algorithms: An Evolutionary Computation Approach (Natural Computing Series)
Automating the Design of Data Mining Algorithms: An Evolutionary Computation Approach (Natural Computing Series)

Traditionally, evolutionary computing techniques have been applied in the area of data mining either to optimize the parameters of data mining algorithms or to discover knowledge or patterns in the data, i.e., to directly solve the target data mining problem. This book proposes a different goal for evolutionary algorithms in data mining: to...

Middleware Management with Oracle Enterprise Manager Grid Control 10g R5
Middleware Management with Oracle Enterprise Manager Grid Control 10g R5
Today's IT environment is very complex, encompassing a myriad of technologies and middleware platforms. Many organizations have large and heterogeneous middleware platforms that power their enterprise applications and it is often a real challenge for administrators to meet agreed service levels and minimize downtime. Oracle Enterprise Manager...
Shape Interrogation for Computer Aided Design and Manufacturing
Shape Interrogation for Computer Aided Design and Manufacturing

Shape interrogation is the process of extraction of information from a geometric model. It is a fundamental component of Computer Aided Design and Manufacturing (CAD/CAM) systems. The authors focus on shape interrogation of geometric models bounded by free-form surfaces. Free-form surfaces, also called sculptured surfaces, are widely used in the...

miRNA Regulation of the Translational Machinery (Progress in Molecular and Subcellular Biology)
miRNA Regulation of the Translational Machinery (Progress in Molecular and Subcellular Biology)

The silencing of gene expression by small interfering RNAs has been recognized for only a relatively short time, but this has transformed our understanding of both transcriptional and post-transcriptional gene regulatory mechanisms. Multiple pathways culminate in formation of an RNA-induced silencing complex (RISC) containing a member of the...

Collaborative Search: Designing Systems for a Spectrum of Collaborative Styles (Synthesis Lectures on Information Concepts, Retrieval, and Services)
Collaborative Search: Designing Systems for a Spectrum of Collaborative Styles (Synthesis Lectures on Information Concepts, Retrieval, and Services)
Web search has become one of the prominent information behaviors of the new millennium (Fallows, D., 2008). Web search refers not only to the process of entering keywords into a search engine site, but it also includes a related ecology of online information-seeking activities, such as browsing to specific URLs, making sense of found content,...
Foundations of Dependable Computing: Paradigms for Dependable Applications
Foundations of Dependable Computing: Paradigms for Dependable Applications
Foundations of Dependable Computing: Paradigms for Dependable Applications, presents a variety of specific approaches to achieving dependability at the application level. Driven by the higher level fault models of Models and Frameworks for Dependable Systems, and built on the lower level abstractions implemented in a third companion book...
Foundations of Dependable Computing: Models and Frameworks for Dependable Systems
Foundations of Dependable Computing: Models and Frameworks for Dependable Systems
Foundations of Dependable Computing: Models and Frameworks for Dependable Systems presents two comprehensive frameworks for reasoning about system dependability, thereby establishing a context for understanding the roles played by specific approaches presented in this book's two companion volumes. It then explores the range of models and...
Foundations of Dependable Computing: System Implementation
Foundations of Dependable Computing: System Implementation
Foundations of Dependable Computing: System Implementation, explores the system infrastructure needed to support the various paradigms of Paradigms for Dependable Applications. Approaches to implementing support mechanisms and to incorporating additional appropriate levels of fault detection and fault tolerance at the processor, network, and...
Introduction to Reconfigurable Supercomputing (Synthesis Lectures on Computer Architecture)
Introduction to Reconfigurable Supercomputing (Synthesis Lectures on Computer Architecture)

This book covers technologies, applications, tools, languages, procedures, advantages, and disadvantages of reconfigurable supercomputing using Field Programmable Gate Arrays (FPGAs). The target audience is the community of users of High Performance Computers (HPC) who may benefit from porting their applications into a reconfigurable...

Practical Guide to Fedora and Red Hat Enterprise Linux, A (5th Edition)
Practical Guide to Fedora and Red Hat Enterprise Linux, A (5th Edition)

Praise for Previous Editions of A Practical Guide to Fedora™ and Red Hat® Enterprise Linux®

 

“Since I’m in an educational environment, I found the content of Sobell’s book...

Windows System Programming (4th Edition) (Addison-Wesley Microsoft Technology Series)
Windows System Programming (4th Edition) (Addison-Wesley Microsoft Technology Series)

“If you’re writing a native Win32 program or just want to know what the OS is really doing underneath, you need John’s book. He covers the stuff that real systems programmers absolutely must know. Recommended.”

–Chris Sells, Microsoft Corporation

...
Oracle 11g Streams Implementer's Guide
Oracle 11g Streams Implementer's Guide

This Preface and the entire book are a little bit different—and that is by design. Both authors wrote this book understanding that our target audience often does not have time to read a whole book, or the Oracle documentation, from cover to cover. As such, we wrote this book with the idea that the table of contents and headings should tell...

Result Page: 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy