Home | Amazing | Today | Tags | Publishers | Years | Search 
Social Simulation: Technologies, Advances and New Discoveries (Premier Reference)
Social Simulation: Technologies, Advances and New Discoveries (Premier Reference)
The simulation of social behavior in a variety of domains is an increasingly important technological tool.

eference survey of social simulation work, Social Simulation: Technologies, Advances and New Discoveries comprehensively collects the most exciting developments in the field. Drawing research contributions from a vibrant...

Algorithms & Architectures (Neural Network Systems Techniques and Applications)
Algorithms & Architectures (Neural Network Systems Techniques and Applications)
Inspired by the structure of the human brain, artificial neural networks have been widely applied to fields such as pattern recognition, optimization, coding, control, etc., because of their ability to solve cumbersome or intractable problems by learning directly from data. An artificial neural network usually consists of a large number of simple...
Parallel Programming in OpenMP
Parallel Programming in OpenMP
"This book will provide a valuable resource for the OpenMP community."

- Timothy G. Mattson, Intel Corporation

"This book has an important role to play in the HPC community-both for introducing practicing professionals to OpenMP and for educating students and professionals about parallel programming. I'm happy...

Mac OS X Leopard QuickSteps
Mac OS X Leopard QuickSteps
Step-by-Step, Full-Color Graphics!

Get started using Mac OS X 10.5 Leopard right away--the QuickSteps way. Color screenshots and clear instructions show you how to use all the new and improved features available in...

Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.
...
IT Disaster Recovery Planning For Dummies (Computer/Tech)
IT Disaster Recovery Planning For Dummies (Computer/Tech)

Create a safety net while you work out your major plan

Identify critical IT systems, develop a long-range strategy, and train your people

Some disasters get coverage on CNN — some just create headaches for the affected organization. The right plan will get your business back...

Turing (A Novel about Computation)
Turing (A Novel about Computation)
Our hero is Turing, an interactive tutoring program and namesake (or virtual emanation?) of Alan Turing, World War II code breaker and father of computer science. In this unusual novel, Turing's idiosyncratic version of intellectual history from a computational point of view unfolds in tandem with the story of a love affair involving Ethel, a...
LAN Wiring
LAN Wiring
250+ detailed illustrations

The bestselling, state-of-the-art guide to cable installation for voice and data revised and updated to reflect the very latest advances and standards

Packed with essential time- and trouble-saving information, and written by a 25-year cabling veteran, LAN...

Remote Sensing Image Analysis: Including the Spatial Domain (Remote Sensing and Digital Image Processing)
Remote Sensing Image Analysis: Including the Spatial Domain (Remote Sensing and Digital Image Processing)
Remote Sensing image analysis is mostly done using only spectral information on a pixel by pixel basis. Information captured in neighbouring cells, or information about patterns surrounding the pixel of interest often provides useful supplementary information. This book presents a wide range of innovative and advanced image processing methods for...
JSTL: Practical Guide for JSP Programmers (The Practical Guides)
JSTL: Practical Guide for JSP Programmers (The Practical Guides)
An invaluable reference for any JSP developer's library. Sue makes the complicated seem simple with her conversational writing style and well thought out examples and analogies.

-Matt Houser, J2EE Developer with The Washington Post and former Sun Microsystems Java Instructor.

Web developers and page
...
Comprehensive Functional Verification: The Complete Industry Cycle (Systems on Silicon)
Comprehensive Functional Verification: The Complete Industry Cycle (Systems on Silicon)
As designs increase in complexity, so has the value of verification engineers within the hardware design team. In fact, the need for skilled verification engineers has grown dramatically--functional verification now consumes between 40 and 70% of a project's labor, and about half its cost. Currently there are very few books on verification for...
Data Preparation for Data Mining Using SAS (The Morgan Kaufmann Series in Data Management Systems)
Data Preparation for Data Mining Using SAS (The Morgan Kaufmann Series in Data Management Systems)
"It is easy to write books that address broad topics and ideas leaving the reader with the question Yes, but how? By combining a comprehensive guide to data preparation for data mining along with specific examples in SAS, Mamdouh's book is a rare finda blend of theory and the practical at the same time. As anyone who has mined data will...
Result Page: 976 975 974 973 972 971 970 969 968 967 966 965 964 963 962 961 960 959 958 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy