Home | Amazing | Today | Tags | Publishers | Years | Search 
Closed Object Boundaries from Scattered Points (Lecture Notes in Computer Science)
Closed Object Boundaries from Scattered Points (Lecture Notes in Computer Science)

This Ph.D. dissertation presents the result of research carried out between 1985 and 1992, first at Leiden University as a scientific assistant researcher, and later at CWI (Centre for Mathematics and Computer Science), Amsterdam, as a researcher on the NFI IIICAD project, funded by NWO (Dutch Organization for Scientific Research)...

Business Intelligence in Microsoft SharePoint 2010
Business Intelligence in Microsoft SharePoint 2010

Whether you are a SQL Server business intelligence (BI) developer or a SharePoint Administrator, this book shows you how Microsoft is delivering on its commitment to provide useful, usable BI to its customers. It provides a quick dive into new Microsoft SharePoint 2010 BI features and offerings as well as new SQL Server BI...

Data Mining Techniques: For Marketing, Sales, and Customer Relationship Management
Data Mining Techniques: For Marketing, Sales, and Customer Relationship Management

Fifteen years ago, Michael and I wrote the first version of this book. A little more than 400 pages, the book fulfilled our goal of surveying the field of data mining by bridging the gap between the technical and the practical, by helping business people understand the data mining techniques and by helping technical people understand the...

Object-Oriented Software Engineering: Practical Software Development using UML and Java
Object-Oriented Software Engineering: Practical Software Development using UML and Java

This earliest recorded attempt to regulate the engineering profession reminds us, in the bluntest way possible, that the paramount purpose of engineering and engineering design is to serve the user. One would assume that the engineer’s responsibility to users is so self evident that it goes without saying. Various professional...

Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age
Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age

The telegraph, telephone, radio, and especially the computer have put everyone on the globe within earshot— at the price of our privacy. It may feel like we're performing an intimate act when, sequestered in our rooms and cubicles, we casually use our cell phones and computers to transmit our thoughts, confidences,...

Mechanisms of Implicit Learning: Connectionist Models of Sequence Processing
Mechanisms of Implicit Learning: Connectionist Models of Sequence Processing

What do people learn when they do not know that they are learning? Until recently all of the work in the area of implicit learning focused on empirical questions and methods. In this book, Axel Cleeremans explores unintentional learning from an information-processing perspective. He introduces a theoretical framework that unifies existing...

Fundamentals of Digital Logic with VHDL Design
Fundamentals of Digital Logic with VHDL Design

This book is intended for an introductory course in digital logic design, which is a basic course in most electrical and computer engineering programs. A successful designer of digital logic circuits needs a good understanding of basic concepts and a firm grasp of computer-aided design (CAD) tools. The purpose of our book is to provide...

Exam 98-365: MTA Windows Server Administration Fundamentals (Microsoft Official Academic Course)
Exam 98-365: MTA Windows Server Administration Fundamentals (Microsoft Official Academic Course)

Welcome to the Microsoft Official Academic Course (MOAC) program for Windows Server Administration Fundamentals. MOAC represents the collaboration between Microsoft Learning and John Wiley & Sons, Inc. publishing company. Microsoft and Wiley teamed up to produce a series of textbooks that deliver compelling and innovative teaching...

LR Parsing: Theory and Practice (Cambridge Studies in Cultural Systems)
LR Parsing: Theory and Practice (Cambridge Studies in Cultural Systems)

LR parsing has become a widely used method of syntax analysis; this is largely due to the availability of parser generators and compiler- compilers based on LR techniques. However, the readily available ac counts of the theory of these techniques are either superficial or are weighed down with tedious mathematical detail of a merely...

Communicating Systems & Networks: Traffic & Performance (Innovative Technology Series)
Communicating Systems & Networks: Traffic & Performance (Innovative Technology Series)

This book originates from the desire to perpetuate expertise in the field of performance evaluation, particularly for telecommunication systems and networks. It is obviously impossible to translate into a single work all the facets of an activity which encompasses many systems and a great variety of domains such as standardization,...

Electronic Value Exchange: Origins of the VISA Electronic Payment System (History of Computing)
Electronic Value Exchange: Origins of the VISA Electronic Payment System (History of Computing)

Most anywhere in the developed world, I can use a small rectangular piece of plastic, issued to me by a bank I have never visited, to obtain local currency or purchase goods and services directly from a merchant. The cashier and I may not even speak a common language, and the face of my card may look quite different from those carried...

Introducing Autodesk Maya 2012 (Autodesk Official Training Guides)
Introducing Autodesk Maya 2012 (Autodesk Official Training Guides)

Welcome to Introducing Autodesk Maya 2012 and the world of computer-generated imagery (CGI). Whether you’re new to 3D graphics or venturing into Autodesk’s powerhouse animation software from another 3D application, you’ll find this book a perfect primer. It introduces you to Maya and shows how you can work with Maya to...

Result Page: 895 894 893 892 891 890 889 888 887 886 885 884 883 882 881 880 879 878 877 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy