Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Evolutionary Computation in Data Mining (Studies in Fuzziness and Soft Computing)
Evolutionary Computation in Data Mining (Studies in Fuzziness and Soft Computing)
This carefully edited book reflects and advances the state of the art in the area of Data Mining and Knowledge Discovery with Evolutionary Algorithms. It emphasizes the utility of different evolutionary computing tools to various facets of knowledge discovery from databases, ranging from theoretical analysis to real-life applications....
Prevention of Allergy and Allergic Asthma (Chemical Immunology and Allergy)
Prevention of Allergy and Allergic Asthma (Chemical Immunology and Allergy)

In the western world, the prevalence of allergy and asthma has increased two- to threefold over the last 40 years and has reached epidemic proportions. This book represents the first complete document containing recommendations on the prevention of allergy and allergic asthma based on the current understanding of the immunological mechanisms...

Aging: Theories and Potential Therapies (New Biology)
Aging: Theories and Potential Therapies (New Biology)

Discusses the aging process and diseases associated with it, compares human and animal life spans, describes geriatrics and its history, examines ways of extending life, and includes background material on cell biology.

...
AI for Game Developers
AI for Game Developers
Written for the novice AI programmer, AI for Game Developers introduces you to techniques such as finite state machines, fuzzy logic, neural networks, and many others, in straightforward, easy-to-understand language, supported with code samples throughout the entire book (written in C/C++). From basic...
Managing Security with Snort and IDS Tools
Managing Security with Snort and IDS Tools
This practical guide to managing network security covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive resource for monitoring illegal entry attempts, ...
Handbook of Data Structures and Applications
Handbook of Data Structures and Applications

Handbook of Data Structures and Applications responds to the needs of data structure and algorithm researchers by providing a comprehensive survey of data structures of various types. Divided into seven parts, the text begins with a review of introductory material, followed by a discussion of well-know classes of data structures, Priority...

The Haskell Road to Logic, Maths and Programming (Texts in Computing S.)
The Haskell Road to Logic, Maths and Programming (Texts in Computing S.)
Long ago, when Alexander the Great asked the mathematician Menaechmus for a crash course in geometry, he got the famous reply “There is no royal road to mathematics.” Where there was no shortcut for Alexander, there is no shortcut for us. Still, the fact that we have access to computers and mature programming languages means that there...
Guerrilla Marketing for Consultants: Breakthrough Tactics for Winning Profitable Clients
Guerrilla Marketing for Consultants: Breakthrough Tactics for Winning Profitable Clients
Proven guerrilla marketing tactics specifically designed for consultants

Jay Conrad Levinson’s Guerrilla Marketing revolutionized the way marketers do business by defying the conventional wisdom that effective marketing means spending big bucks. He devised highly successful marketing strategies that rely on creativity, imagination, and...

Programming Ruby: The Pragmatic Programmers' Guide, Second Edition
Programming Ruby: The Pragmatic Programmers' Guide, Second Edition
Ruby is an increasingly popular, fully object-oriented dynamic programming language, hailed by many practitioners as the finest and most useful language available today. When Ruby first burst onto the scene in the Western world, the Pragmatic Programmers were there with the definitive reference manual, Programming Ruby: The Pragmatic...
Feedback Control of Computing Systems
Feedback Control of Computing Systems
A pioneering reference on control theory designed specifically for computer professionals

In today’s computerized economy, the profitability and availability of many businesses rely on a clear understanding of the dynamics of their computing systems, especially how they relate to changes in workloads and configuration. Frequent,...

Refactoring to Patterns (The Addison-Wesley Signature Series)
Refactoring to Patterns (The Addison-Wesley Signature Series)

In 1994, Design Patterns changed the landscape of object-oriented development by introducing classic solutions to recurring design problems. In 1999, Refactoring revolutionized design by introducing an effective process for improving code. With the highly anticipated Refactoring to Patterns, Joshua...

Programming From The Ground Up
Programming From The Ground Up
This text uses Linux assembly language to take you one step at a time how processors view memory, how the processor works, how programs interact with an OS, how computers represent data internally, and much more.

The difference between mediocre and star programmers is that star programmers understand assembly language, whether or not they...

Result Page: Previous 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 Next 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy