Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Numerical Methods in Engineering with MATLAB
Numerical Methods in Engineering with MATLAB

The second edition was largely precipitated by the introduction of anonymous functions into MATLAB. This feature, which allows us to embed functions in a program, rather than storing them in separate files, helps to alleviate the scourge of MATLAB programmers – proliferation of small files. In this edition, we have recoded all the...

Constraint Logic Programming using Eclipse
Constraint Logic Programming using Eclipse

Constraint logic programming lies at the intersection of logic programming, optimisation and artificial intelligence. It has proved a successful tool in many areas including production planning, transportation scheduling, numerical analysis and bioinformatics. Eclipse is one of the leading software systems that realise its underlying...

Musculoskeletal Imaging Companion
Musculoskeletal Imaging Companion
Like the first edition, the second edition of Musculoskeletal Imaging Companion is primarily designed for students and radiology trainees to provide the basics on imaging of common musculoskeletal diseases. However, this...
Computational Red Teaming: Risk Analytics of Big-Data-to-Decisions Intelligent Systems
Computational Red Teaming: Risk Analytics of Big-Data-to-Decisions Intelligent Systems

Written to bridge the information needs of management and computational scientists, this book presents the first comprehensive treatment of Computational Red Teaming (CRT).  The author describes an analytics environment that blends human reasoning and computational modeling to design risk-aware and evidence-based smart decision making...

Text Mining: Predictive Methods for Analyzing Unstructured Information
Text Mining: Predictive Methods for Analyzing Unstructured Information

The growth of the web can be seen as an expanding public digital library collection. Online digital information extends far beyond the web and its publicly available information. Huge amounts of information are private and are of interest to local communities, such as the records of customers of a business. This information is overwhelmingly...

Utility-Based Learning from Data
Utility-Based Learning from Data

Statistical learning — that is, learning from data — and, in particular, probabilistic model learning have become increasingly important in recent years. Advances in information technology have facilitated an explosion of available data. This explosion has been accompanied by theoretical advances, permitting new and...

Developing Mobile Web ArcGIS Applications
Developing Mobile Web ArcGIS Applications

Learn to build your own engaging and immersive geographic applications with ArcGIS

About This Book

  • Create multi-utility apps for mobiles using ArcGIS Server quickly and easily
  • Start with the basics and move through to creating advanced mobile ArcGIS apps
  • Plenty of...
A Practical Guide to Linux(R) Commands, Editors, and Shell Programming
A Practical Guide to Linux(R) Commands, Editors, and Shell Programming

The essential reference for core commands that Linux users need daily, along with superior tutorial on shell programming and much moreSystem administrators, software developers,  quality assurance engineers and others  working on a Linux system need to work from the command line in order to be effective.  Linux is...

Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers (Embedded Technology)
Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers (Embedded Technology)
Wireless networking is poised to have a massive impact on communications, and the 802.11 standard is to wireless networking what Ethernet is to wired networking. There are already over 50 million devices using the dominant IEEE 802.11 (essentially wireless Ethernet) standard, with astronomical growth predicted over the next 10 years. New...
iOS 5 in the Enterprise (Develop and Design)
iOS 5 in the Enterprise (Develop and Design)

 

Those of you who have to deal with more than a handful of iPhones, iPads, or iPod Touches already know why you manage iOS devices. For everyone else, “manage” is not a short way to say “impose draconian control.” Managing devices on your network, including iOS devices,
...
Epidermal Cells: Methods and Protocols (Methods in Molecular Biology Series)
Epidermal Cells: Methods and Protocols (Methods in Molecular Biology Series)

A collection of cutting-edge methods to analyze and manipulate epidermal cellprecursors and mature epidermal cells. These protocols cover different methods and models for culturing epidermal cells, for enriching very early epidermal progenitors, and for studying epidermal cell commitment and differentiation both in vitro and in vivo. Topics...

Perl Medic : Transforming Legacy Code
Perl Medic : Transforming Legacy Code
Bring new power, performance, and scalability to your existing Perl code!

Today's Perl developers spend 60-80% of their time working with existing Perl code. Now, there's a start-to-finish guide to understanding that code, maintaining it, updating it, and refactoring it for maximum performance and reliability. Peter J. Scott, lead author of...

Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy