Home | Amazing | Today | Tags | Publishers | Years | Search 
Pattern Recognition in Speech and Language Processing (Electrical Engineering & Applied Signal Processing Series)
Pattern Recognition in Speech and Language Processing (Electrical Engineering & Applied Signal Processing Series)

Over the last 20 years, approaches to designing speech and language processing algorithms have moved from methods based on linguistics and speech science to data-driven pattern recognition techniques. These techniques have been the focus of intense, fast-moving research and have contributed to significant advances in this field.
...

Managing Projects Well
Managing Projects Well

Few people realise how many projects people actually manage. Or how many of the theoretical approaches to Project Management do not meet the test of the real world.

This intensive look at Project Management teaches people what they need to know to lead, or be a member of, a project team. Most Project
...

Adaptive Filters Theory and Applications
Adaptive Filters Theory and Applications

Adaptive filtering is an advanced and growing field in signal processing. A filter is a transmission network used in electronic circuits for the selective enhancement or reduction of specified components of an input signal. Filtering is achieved by selectively attenuating those components of the input signal which are undesired, relative to...

Introduction to Mathematical Logic
Introduction to Mathematical Logic

Logic is sometimes called the foundation of mathematics: the logician studies the kinds of reasoning used in the individual steps of a proof. Alonzo Church was a pioneer in the field of mathematical logic, whose contributions to number theory and the theories of algorithms and computability laid the theoretical foundations of computer...

The Pillars of Computation Theory: State, Encoding, Nondeterminism (Universitext)
The Pillars of Computation Theory: State, Encoding, Nondeterminism (Universitext)

The abstract branch of theoretical computer science known as Computation Theory typically appears in undergraduate academic curricula in a form that obscures both the mathematical concepts that are central to the various components of the theory and the relevance of the theory to the typical student. This regrettable situation is due largely...

Internet Success: A Study of Open-Source Software Commons
Internet Success: A Study of Open-Source Software Commons

The use of open-source software (OSS)--readable software source code that can be copied, modified, and distributed freely--has expanded dramatically in recent years. The number of OSS projects hosted on SourceForge.net (the largest hosting Web site for OSS), for example, grew from just over 100,000 in 2006 to more than 250,000 at the...

Synchronization of Digital Telecommunications Networks
Synchronization of Digital Telecommunications Networks

Network synchronization deals with the distribution of time and frequency across a network of clocks often spread over a wide geographical area. The goal is to align (i.e. synchronize) the time and frequency scales of all clocks, by using the communication capacity of their interconnecting links.

Network synchronization plays a...

The Photography Handbook (Media Practice)
The Photography Handbook (Media Practice)

The Photography Handbook provides an introduction to the principles of photographic practice and theory and offers guidelines for the systematic study of photographic media. It explores the history of lens-based picture making and examines the mediums' characteristics, scope and limitations.

Equipping the reader with a...

Control of Higher-Dimensional PDEs: Flatness and Backstepping Designs
Control of Higher-Dimensional PDEs: Flatness and Backstepping Designs

This monograph presents new model-based design methods for trajectory planning, feedback stabilization, state estimation, and tracking control of distributed-parameter systems governed by partial differential equations (PDEs). Flatness and backstepping techniques and their generalization to PDEs with higher-dimensional spatial domain lie at...

Learning Metasploit Exploitation and Development
Learning Metasploit Exploitation and Development

Metasploit is an open source exploit framework that provides you with heaps of exploits, as well as tools to assist you in creating your own exploits. This includes the ability to generate a large range of shellcodes for different purposes and platforms that can be customized to attack your target. The recent improvements in network security...

Scandinavian Colonialism and the Rise of Modernity: Small Time Agents in a Global Arena
Scandinavian Colonialism and the Rise of Modernity: Small Time Agents in a Global Arena

In Scandinavian Colonialism and the Rise of Modernity: Small Time Agents in a Global Arena, archaeologists, anthropologists, and historians present case studies that focus on the scope and impact of Scandinavian colonial expansion in the North, Africa, Asia and America as well as within Scandinavia itsself. They discuss early...

Ontology Matching
Ontology Matching

Ontologies tend to be found everywhere. They are viewed as the silver bullet for many applications, such as database integration, peer-to-peer systems, e-commerce, semantic web services, or social networks. However, in open or evolving systems, such as the semantic web, different parties would, in general, adopt different ontologies. Thus,...

Result Page: 171 170 169 168 167 166 165 164 163 162 161 160 159 158 157 156 155 154 153 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy