Explore cutting-edge statistical methodologies for collecting, analyzing, and modeling online auction data
Online auctions are an increasingly important marketplace, as the new mechanisms and formats underlying these auctions have enabled the capturing and recording of large amounts of bidding data that are used to make...
So you’ve decided to be a photographer. You studied photography in
college or went to art school, and you’ve come to the point of deciding
that it’s time to hang out your shingle. Or maybe you’re self-taught and
everyone loves your work and says, “Hey, you could make...
ANTS-IX was the ninth edition of the biennial International Symposium on
Algorithmic Number Theory. The first edition of this symposium was held at
Cornell University in 1994. ANTS-IX was held July 19-23, 2010 at INRIA in
Nancy, France.
The ANTS-IX Program Committee consisted of 12 members whose names
are listed on the next...
Geographical Information Systems (GIS) are computer systems for storing, displaying and analyzing spatial data. The past twenty years have seen a rapid growth in their use in government, commerce and academia, and they can be used for managing a network of utilities, from handling census data through to planning the location of a new...
The Definitive Guide to Governing Shared Services and SOA Projects
SOA Governance: Governing Shared Services On-Premise and in the Cloud is the result of a multi-year project to collect proven industry practices for establishing IT governance controls specific to the adoption of SOA...
Mention the word audit to IT professionals and you will probably see their eyes glaze over as
they imagine frightening visions of auditors with pointy tails, pitchforks, and checklists run
ning around and pointing out all of the things they have done wrong to their manager. The
purpose of a security audit is not to place blame or pick...
Welcome to Autodesk Revit Architecture 2012 Essentials, based on the Revit Architecture 2012 release.
What you are holding in your hands is the first Revit book in a new series. When we authors first sat down to learn Revit (eons ago), each of us was put into a room with a trainer, and over the course of four days, we clicked...
Since the World Wide Web became widely available in the
mid 1990s, Web-based applications have developed rapidly.
The Web has come to be used by a range of people for many
different purposes, including online banking, e-commerce,
distance education, social networking, data sharing, collaborating
on team projects, and...
With all the fantastic Cisco documentation available online, why does the world of
UCCE need this book? UCCE is such a big topic that it would be easy to think that it is
possible to try and cover absolutely everything. Unfortunately, this would turn this book
into nothing more than a product reference manual that could potentially be...
This brief monograph is the first one to deal exclusively with the quantitative approximation by artificial neural networks to the identity-unit operator. Here we study with rates the approximation properties of the "right" sigmoidal and hyperbolic tangent artificial neural network positive linear operators. In particular we study...
Building your own Python web applications provides you with the opportunity to have great
functionality, with no restrictions. However, creating web applications with Python is not
straightforward. Coupled with learning a new skill of developing web applications, you would
normally have to learn how to work with a framework as well.
The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and...