Home | Amazing | Today | Tags | Publishers | Years | Search 
Web Analytics Action Hero: Using Analysis to Gain Insight and Optimize Your Business
Web Analytics Action Hero: Using Analysis to Gain Insight and Optimize Your Business
This astounding declaration was made by the former PepsiCo executive and Apple CEO John Sculley, the same visionary responsible for ousting Steve Jobs in 1985. While some traditional marketers might still agree with his statement, today most marketing executives recognize data-driven decisions will shape the future of...
Generic Inference: A Unifying Theory for Automated Reasoning
Generic Inference: A Unifying Theory for Automated Reasoning
Abstract mathematical structures usually have a large number of models. Algorithms based on operations and laws of such structures therefore have an identical form: they are generic. This means that for each particular instance of the structure, only the basic operations have to be adapted, whereas the overall algorithm remains the...
Writing for the Web: Creating Compelling Web Content Using Words, Pictures, and Sound
Writing for the Web: Creating Compelling Web Content Using Words, Pictures, and Sound

With Writing for the Web, you’ll learn everything you need to know to create effective Web content using words, pictures, and sound. Follow along as instructor and writer Lynda Felder combines easy-to-follow guidelines with photographs, lists, and tables to illustrate the key concepts behind writing nonlinear, interactive...

Enterprise Software Architecture and Design: Entities, Services, and Resources (Quantitative Software Engineering Series)
Enterprise Software Architecture and Design: Entities, Services, and Resources (Quantitative Software Engineering Series)
This book is about programming-in-the-large, a term coined by DeRemer and Kron [2] to distinguish the assembly of large applications from components, from the task of implementing those components themselves. Many of the principles of programming-in-the-large were earlier elucidated by Parnas in two articles [3, 4]. It is...
Intelligent Learning Infrastructure for Knowledge Intensive Organizations: A Semantic Web Perspective
Intelligent Learning Infrastructure for Knowledge Intensive Organizations: A Semantic Web Perspective
In the knowledge society, the traditional facts of business life are volatile and not given. Every organization is challenged in this context, to enrich its sensors, and its internal processes toward the exploitation of tangible and intangible resources.

During the last few years, an important shift in management
...
Guide to Web Development with Java: Understanding Website Creation
Guide to Web Development with Java: Understanding Website Creation
I have been teaching web development for 14 years. I started with Perl. I can still remember the behemoth programs that contained all the logic and HTML. I remember using a text editor to write the program. Debugging consisted of a lot of print statements. It was a fun time, full of exploration, but I do not miss them.

...
packetC Programming
packetC Programming

This book covers a vast array of information related to packetC. It is a complete language reference and contains background information on many unique parts of packetC. As packetC shares much of its grammar with C, the book focuses on being an instructional language reference and not a general C programming introduction, since extensive...

SharePoint 2010 at Work: Tricks, Traps, and Bold Opinions
SharePoint 2010 at Work: Tricks, Traps, and Bold Opinions
Most people have heard the timeless parable of the six blind men trying to describe an elephant. Each man touches the elephant and, based upon the part of the body he touches, proceeds to give a definitive description of “an elephant.” None of the descriptions are correct, and yet they are all correct....
Application Security for the Android Platform: Processes, Permissions, and Other Safeguards
Application Security for the Android Platform: Processes, Permissions, and Other Safeguards
The purpose of this book is to convey vital knowledge about application security to developers working on the Android platform, to enable the development of robust, rugged, and more secure applications. While application security knowledge and skills have matured rapidly over the past couple of years, that...
User-Centered Agile Methods (Synthesis Lectures on Human-Centered Informatics)
User-Centered Agile Methods (Synthesis Lectures on Human-Centered Informatics)
Agile methods have transformed how developers think about organizing the development of a project. Rather than months (or years) of development, followed by months of field test leading up to a release, agile methods organize development into short iterations with continuous testing and a flexible release date. The agile approach...
Interactive Co-segmentation of Objects in Image Collections (SpringerBriefs in Computer Science)
Interactive Co-segmentation of Objects in Image Collections (SpringerBriefs in Computer Science)

The authors survey a recent technique in computer vision called Interactive Co-segmentation, which is the task of simultaneously extracting common foreground objects from multiple related images. They survey several of the algorithms, present underlying common ideas, and give an overview of applications of object co-segmentation.

We
...
Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges
Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges
Peer-to-peer computing, at least on a conceptual level, is a genuine paradigm shift—intelligence is at the edge, computing is completely decentralized, and the network is just there to knit the distributed intelligence together. Indeed, with advancements in hardware technology, proliferation of the open source development...
Result Page: 830 829 828 827 826 825 824 823 822 821 820 819 818 817 816 815 814 813 812 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy