Home | Amazing | Today | Tags | Publishers | Years | Search 
2nd EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing: BDCC 2019 (EAI/Springer Innovations in Communication and Computing)
2nd EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing: BDCC 2019 (EAI/Springer Innovations in Communication and Computing)

This proceeding features papers discussing big data innovation for sustainable cognitive computing. The papers feature details on cognitive computing and its self-learning systems that use data mining, pattern recognition and natural language processing (NLP) to mirror the way the human brain works. This international conference...

The Social Photo: On Photography and Social Media
The Social Photo: On Photography and Social Media
"Mr. Jurgenson makes a first sortie toward a new understanding of the photograph, wherein artistry or documentary intent have given way to communication and circulation. Like Susan Sontag’s On Photography, to which it self-consciously responds, The Social Photo is slim, hard-bitten and picture-free." –...
Guide to Ambient Intelligence in the IoT Environment: Principles, Technologies and Applications (Computer Communications and Networks)
Guide to Ambient Intelligence in the IoT Environment: Principles, Technologies and Applications (Computer Communications and Networks)
Ambient intelligence (AmI) is an element of pervasive computing that brings smartness to living and business environments to make them more sensitive, adaptive, autonomous and personalized to human needs. It refers to intelligent interfaces that recognise human presence and preferences, and adjust smart environments to suit their...
From Russia with Code: Programming Migrations in Post-Soviet Times
From Russia with Code: Programming Migrations in Post-Soviet Times
While Russian computer scientists are notorious for their interference in the 2016 US presidential election, they are ubiquitous on Wall Street and coveted by international IT firms and often perceive themselves as the present manifestation of the past glory of Soviet scientific prowess. Drawing on over three hundred...
Compact Slot Array Antennas for Wireless Communications (Signals and Communication Technology)
Compact Slot Array Antennas for Wireless Communications (Signals and Communication Technology)
This book describes and provides design guidelines for antennas that achieve compactness by using the slot radiator as the fundamental building block within a periodic array, rather than a phased array. It provides the basic electromagnetic tools required to design and analyse these novel antennas, with sample calculations...
New Power: How Power Works in Our Hyperconnected World--and How to Make It Work for You
New Power: How Power Works in Our Hyperconnected World--and How to Make It Work for You
NOW A NATIONAL BESTSELLER

The definitive guide to spreading ideas, building movements, and leaping ahead in our chaotic, connected age. Get the book New York Times columnist David Brooks calls "the best window I’ve seen into this new world."


Why do some leap ahead while others
...
Public Libraries in the Smart City
Public Libraries in the Smart City
Far from heralding their demise, digital technologies have lead to a dramatic transformation of the public library. Around the world, libraries have reinvented themselves as networked hubs, community centres, innovation labs, and makerspaces. Coupling striking architectural design with attention to ambience and comfort, libraries have...
Information Security: The Complete Reference, Second Edition
Information Security: The Complete Reference, Second Edition

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Develop and implement an effective end-to-end security program

Today’s complex world of mobile platforms, cloud...

Information Security Management Handbook, Volume 7
Information Security Management Handbook, Volume 7

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding...

Advanced Programming in the UNIX Environment, 3rd Edition
Advanced Programming in the UNIX Environment, 3rd Edition

For more than twenty years, serious C programmers have relied on one book for practical, in-depth knowledge of the programming interfaces that drive the UNIX and Linux kernels: W. Richard Stevens’ Advanced Programming in the UNIX® Environment . Now, once again, Rich’s colleague Steve...

Electric Machines: Steady State, Transients, and Design with MATLAB®
Electric Machines: Steady State, Transients, and Design with MATLAB®

Ubiquitous in daily life, electric motors/generators are used in a wide variety of applications, from home appliances to internal combustion engines to hybrid electric cars. They produce electric energy in all electric power plants as generators and motion control that is necessary in all industries to increase productivity, save...

The New Rules of Green Marketing: Strategies, Tools, and Inspiration for Sustainable Branding
The New Rules of Green Marketing: Strategies, Tools, and Inspiration for Sustainable Branding

Green products have been around since the 1970s, but it's only in recent years that they've become ubiquitous. That's because savvy green marketers are no longer targeting "deep green" consumers with a "save the planet" pitch. Instead, they're promoting the added value their products provide: better health,...

Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy