Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking the Xbox: An Introduction to Reverse Engineering
Hacking the Xbox: An Introduction to Reverse Engineering
This--this being the attitude encapsulated in Andrew "bunnie" Huang's Hacking the Xbox--is why a lot of people got into the computer industry in the first place. These people liked taking things apart and figuring out how they worked, then making them serve purposes they weren't originally designed for and sharing the new discoveries with...
Designing Human Interface in Speech Technology
Designing Human Interface in Speech Technology
Designing Human Interface in Speech Technology bridges a gap between the needs of the technical engineer and cognitive researchers working in the multidisciplinary area of speech technology applications. The approach is systematic and the focus is on the utility of developing and designing speech related products....
C# 2008 Programmer's Reference (Wrox Programmer to Programmer)
C# 2008 Programmer's Reference (Wrox Programmer to Programmer)
Have access to all aspects of the C# programming language at hand with the C# 2008 Programmer’s Reference, the only comprehensive reference guide for C# programmers. Regardless of your experience with C#, you will appreciate the detailed code samples, which offer a quick and easy way to help you refresh your understanding of...
flex & bison
flex & bison
If you need to parse or process text data in Linux or Unix, this useful book explains how to use flex and bison to solve your problems quickly. flex & bison is the long-awaited sequel to the classic O'Reilly book, lex & yacc. In the nearly two decades since the original book was published, the flex and bison utilities have proven...
Numerical Methods in Engineering with MATLAB
Numerical Methods in Engineering with MATLAB

The second edition was largely precipitated by the introduction of anonymous functions into MATLAB. This feature, which allows us to embed functions in a program, rather than storing them in separate files, helps to alleviate the scourge of MATLAB programmers – proliferation of small files. In this edition, we have recoded all the...

Constraint Logic Programming using Eclipse
Constraint Logic Programming using Eclipse

Constraint logic programming lies at the intersection of logic programming, optimisation and artificial intelligence. It has proved a successful tool in many areas including production planning, transportation scheduling, numerical analysis and bioinformatics. Eclipse is one of the leading software systems that realise its underlying...

Musculoskeletal Imaging Companion
Musculoskeletal Imaging Companion
Like the first edition, the second edition of Musculoskeletal Imaging Companion is primarily designed for students and radiology trainees to provide the basics on imaging of common musculoskeletal diseases. However, this...
Computational Red Teaming: Risk Analytics of Big-Data-to-Decisions Intelligent Systems
Computational Red Teaming: Risk Analytics of Big-Data-to-Decisions Intelligent Systems

Written to bridge the information needs of management and computational scientists, this book presents the first comprehensive treatment of Computational Red Teaming (CRT).  The author describes an analytics environment that blends human reasoning and computational modeling to design risk-aware and evidence-based smart decision making...

Text Mining: Predictive Methods for Analyzing Unstructured Information
Text Mining: Predictive Methods for Analyzing Unstructured Information

The growth of the web can be seen as an expanding public digital library collection. Online digital information extends far beyond the web and its publicly available information. Huge amounts of information are private and are of interest to local communities, such as the records of customers of a business. This information is overwhelmingly...

Utility-Based Learning from Data
Utility-Based Learning from Data

Statistical learning — that is, learning from data — and, in particular, probabilistic model learning have become increasingly important in recent years. Advances in information technology have facilitated an explosion of available data. This explosion has been accompanied by theoretical advances, permitting new and...

Developing Mobile Web ArcGIS Applications
Developing Mobile Web ArcGIS Applications

Learn to build your own engaging and immersive geographic applications with ArcGIS

About This Book

  • Create multi-utility apps for mobiles using ArcGIS Server quickly and easily
  • Start with the basics and move through to creating advanced mobile ArcGIS apps
  • Plenty of...
A Practical Guide to Linux(R) Commands, Editors, and Shell Programming
A Practical Guide to Linux(R) Commands, Editors, and Shell Programming

The essential reference for core commands that Linux users need daily, along with superior tutorial on shell programming and much moreSystem administrators, software developers,  quality assurance engineers and others  working on a Linux system need to work from the command line in order to be effective.  Linux is...

unlimited object storage image
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy