Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Genetic Programming IV: Routine Human-Competitive Machine Intelligence
Genetic Programming IV: Routine Human-Competitive Machine Intelligence

Genetic Programming IV: Routine Human-Competitive Machine Intelligence presents the application of GP to a wide variety of problems involving automated synthesis of controllers, circuits, antennas, genetic networks, and metabolic pathways. The book describes fifteen instances where GP has created an entity that either...

Articulation and Intelligibility (Synthesis Lectures on Speech and Audio Processing)
Articulation and Intelligibility (Synthesis Lectures on Speech and Audio Processing)
This lecture is a review of what is known about modeling human speech recognition (HSR). A model is proposed, and data are tested against the model.

There seem to be a large number of theories, or points of view, on how human speech recognition functions, yet few of these theories are comprehensive. What is needed is a set of models that are...

The Secret History of the World: And How to Get Out Alive
The Secret History of the World: And How to Get Out Alive
I suspected something was wrong with the “facts of life” as they were presented to me when I was a kid. Sure, I then spent a little over thirty years trying to be “normal” and make that square peg fit the round hole, “looking for a reason to believe.” But then there was a memorable day when I finally grew up and...
User Interface Design and Evaluation (Interactive Technologies)
User Interface Design and Evaluation (Interactive Technologies)

Whether you are a professional new to the user-centered design field, or an experienced designer who needs to learn the fundamentals of user interface design and evaluation, this book can lead the way.

What will you get from this book? Based on a course from the Open University, UK which has been taught to over a thousand
...

The Aging Spine
The Aging Spine

The "Bone and Joint Decade" draws our attention with increased intensity to the problem of the changes related to aging of our musculoskeletal system and the associated socioeconomic implications. In view of the increasing age of the worldwide population the impact seems to be tremendous. The editors of The Aging Spine pick up this...

68: Optimizing Hemoglobin Levels and Beyond: Strength for Living and Meaningful Survival
68: Optimizing Hemoglobin Levels and Beyond: Strength for Living and Meaningful Survival
Significant advances in the treatment of patients with cancer have occurred over the last decade, as evidenced by steadily improving cure rates and extended durations of survival. There is often a critical trade-off, however, because more intense cytotoxic regimens may result in increased adverse events, including an...
Breast Cancer Research Protocols (Methods in Molecular Medicine)
Breast Cancer Research Protocols (Methods in Molecular Medicine)

A collection of both well-established and cutting-edge methods for investigating breast cancer biology not only in the laboratory, but also in clinical settings. These readily reproducible techniques solve a variety of problems, ranging from how to collect, store, and prepare human breast tumor samples for analysis, to analyzing cells in vivo...

PostgreSQL: The comprehensive guide to building, programming, and administering PostgreSQL databases, Second Edition
PostgreSQL: The comprehensive guide to building, programming, and administering PostgreSQL databases, Second Edition

The second edition of the best-selling PostgreSQL has been updated to completely cover new features and capabilities of the 8.0 version of PostgreSQL. You will be lead through the internals of the powerful PostgreSQL open source database chapter, offering an easy-to-read, code-based approach...

VPNs Illustrated : Tunnels, VPNs, and IPsec
VPNs Illustrated : Tunnels, VPNs, and IPsec

Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually...

The Mobile Revolution: The Making of Worldwide Mobile Markets
The Mobile Revolution: The Making of Worldwide Mobile Markets
‘We’re moving away from the business of ears to the business of eyes.’

Move over Bill Gates, stand aside Steve Jobs, said the industry pundits after
CeBIT 1998, the famous trade conference. They’d just seen Nokia’s
Communicator 9110, a mobile phone with dazzling capabilities, but what
really
...
Content Computing: Advanced Workshop on Content Computing, AWCC 2004
Content Computing: Advanced Workshop on Content Computing, AWCC 2004

This book constitutes the refereed proceedings of the Advanced Workshop on Content Computing, AWCC 2004, held in Zhen Jiang, Jiang Su, China in November 2004.

The 26 revised full papers and 36 revised short papers presented were carefully reviewed and selected from 194 submissions. The papers are organized in topical sections on mobile...

Beginning Perl Web Development: From Novice to Professional
Beginning Perl Web Development: From Novice to Professional

Beginning Perl Web Development: From Novice to Professional introduces you to the world of Perl Internet application development. This book tackles all areas crucial to developing your first web applications and includes a powerful combination of real-world examples coupled with advice. Topics range from serving and consuming RSS feeds,...

Result Page: Previous 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 Next 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy