Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Art of Agent-Oriented Modeling (Intelligent Robotics and Autonomous Agents)
The Art of Agent-Oriented Modeling (Intelligent Robotics and Autonomous Agents)
Today, when computing is pervasive and deployed over a range of devices by a multiplicity of users, we need to develop computer software to interact with both the ever-increasing complexity of the technical world and the growing fluidity of social organizations. The Art of Agent-Oriented Modeling presents a new conceptual model for...
Terrorism and Public Safety Policing: Implications for the Obama Presidency
Terrorism and Public Safety Policing: Implications for the Obama Presidency

A Pragmatic Answer to the Systematic Change Already Underway

The trends, data, and battle-tested logic do not lie. A perfect storm of extremist ideologies is on the horizon that threatens to challenge the current state of public safety—forcing police chiefs, public administrators, and security...

Advances in Intelligent Web Mastering - 2: Proceedings of the 6th Atlantic Web Intelligence Conference
Advances in Intelligent Web Mastering - 2: Proceedings of the 6th Atlantic Web Intelligence Conference

Welcome to the 6th Atlantic Web Intelligence Conference (AWIC 2009), to be held during September 9-11, 2009 in Prague, Czech Republic. The conference will be held at the Faculty of Mathematics and Physics of the Charles University, Prague. This building has a convenient location in the historical city center, in the area called Lesser Town close...

Advanced Functional Programming: 6th International School, AFP 2008, Heijen, The Netherlands, May 19-24, 2008, Revised Lectures
Advanced Functional Programming: 6th International School, AFP 2008, Heijen, The Netherlands, May 19-24, 2008, Revised Lectures

This tutorial book presents seven carefully revised lectures given at the 6th International School on Functional Programming, AFP 2008, in Heijen, The Netherlands in May 2008.

The book presents the following seven, carefully cross-reviewed chapters, written by leading authorities in the field: Self-adjusting: Computation with Delta ML,...

The Encyclopedia of Demons and Demonology
The Encyclopedia of Demons and Demonology

The conflict between good and evil can be found in every culture, mythical tradition, and religion throughout history. In many cases, the source of evil has been personified as demons or devils, and in many belief systems, both are considered to be real entities operating outside the boundaries of the physical world to torment people or lead...

CCNA Security Course Booklet, Version 1.0
CCNA Security Course Booklet, Version 1.0

The Cisco CCNA Security curriculum provides a comprehensive overview of contemporary network security, helping Cisco Networking Academy students systematically prepare for the latest CCNA Security exam. While extensive online study resources are available, many students and instructors have requested a low-cost printed resource that can be...

Why Kids Kill: Inside the Minds of School Shooters
Why Kids Kill: Inside the Minds of School Shooters

Ten years after the school massacre at Columbine High School in Colorado, school shootings are a new and alarming epidemic. While sociologists have attributed the trigger of violence to peer pressure, such as bullying and social isolation, prominent...

Applying Design for Six Sigma to Software and Hardware Systems
Applying Design for Six Sigma to Software and Hardware Systems

The Practical, Example-Rich Guide to Building Better Systems, Software, and Hardware with DFSS

Design for Six Sigma (DFSS) offers engineers powerful opportunities to develop more successful systems, software, hardware, and processes. In Applying Design for Six Sigma to Software and Hardware Systems, two
...

SQL Server Tacklebox Essential tools and scripts for the day-to-day DBA
SQL Server Tacklebox Essential tools and scripts for the day-to-day DBA

For the day-to-day DBA, there are dangers around every corner; monsters waiting to strike down the unsuspecting database with a resource-hungry query, an inefficient data load, or even outright data corruption. When the worst happens, and SQL Server is down, or performance is suffering, customers are quick to complain.. During such difficult...

DB2 pureXML Cookbook: Master the Power of the IBM Hybrid Data Server
DB2 pureXML Cookbook: Master the Power of the IBM Hybrid Data Server

Hands-On Solutions and Best Practices for Developing and Managing XML Database Applications with DB2

 

More and more database developers and DBAs are being asked to develop applications and manage databases that involve XML data. Many are utilizing...

Project management
Project management
Project management is a rapidly growing focus discipline within most businesses and organizations, binding the opti- mal way of operating and managing projects is a continuous challenge. It might involve fine-tuning work methods, clarifying roles and simplifying project reporting, or visualizing progress through the...
Asymmetric Warfare in South Asia: The Causes and Consequences of the Kargil Conflict
Asymmetric Warfare in South Asia: The Causes and Consequences of the Kargil Conflict

The 1999 conflict between India and Pakistan near the town of Kargil in contested Kashmir was the first military clash between two nuclear-armed powers since the 1969 Sino-Soviet war. Kargil was a landmark event not because of its duration or casualties, but because it contained a very real risk of nuclear escalation. Until the Kargil...

Result Page: Previous 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 Next 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy