Sense8 8.3 | voir épisode 11 | Jacqueline Samuda
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ant Colony Optimization and Constraint Programming
Ant Colony Optimization and Constraint Programming

Ant colony optimization is a metaheuristic which has been successfully applied to a wide range of combinatorial optimization problems. The author describes this metaheuristic and studies its efficiency for solving some hard combinatorial problems, with a specific focus on constraint programming. The text is organized into three parts.

...
50 Android Hacks
50 Android Hacks

Summary

The best programming techniques are often the shortest and simplest—the hacks. In this compact and infinitely useful book, Android expert Carlos Sessa delivers 50 hacks that will save you time, stretch your skills, and maybe even make you smile.

About this Book

Hacks....

GIS for Web Developers: Adding 'Where' to Your Web Applications
GIS for Web Developers: Adding 'Where' to Your Web Applications

There is a hidden revolution going on: geography is moving from niche to the mainstream. News reports routinely include maps and satellite images. More and more pieces of equipment cell phones, cars, computers now contain Global Positioning System (GPS) receivers. Many of the major database vendors have made geographic data types...

The CRC Card Book
The CRC Card Book

Applying the object--oriented paradigm to the development of software requires individuals and teams to think and act differently than when designing procedural projects. While proponents of the object paradigm often say identifying objects is a simple and intuitive process, experienced developers know that this is not always true. The...

Modeling and Simulation of Systems Using MATLAB and Simulink
Modeling and Simulation of Systems Using MATLAB and Simulink

Not only do modeling and simulation help provide a better understanding of how real-world systems function, they also enable us to predict system behavior before a system is actually built and analyze systems accurately under varying operating conditions. Modeling and Simulation of Systems Using MATLAB® and...

Microsoft Word 2010: Illustrated Complete (Illustrated Series: Individual Office Applications)
Microsoft Word 2010: Illustrated Complete (Illustrated Series: Individual Office Applications)

Loved by instructors for its visual and flexible way to build computer skills, the Illustrated Series is ideal for teaching Microsoft Office Word 2010 to both computer rookies and hotshots. Each two-page spread focuses on a single skill, making information easy to follow and absorb. Large, full-color illustrations represent how the...

Internet Programming
Internet Programming
So far, we have described many features of the Java programming language that are broadly equivalent to those in other programming languages. This unit marks a change in that we will consider some of the more distinctive aspects of Java, which make it very popular for internet-related programming. We will describe how to use Java to program...
Fedora Linux Servers with systemd: second edition
Fedora Linux Servers with systemd: second edition

This book is designed as a server reference for Fedora Linux with systemd. This second edition covers Fedora Linux 23. Administration tools are covered as well as the underlying configuration files and system implementations. The emphasis is on what administrators will need to know to perform key networking and server tasks. Topics covered...

Social Network-Based Recommender Systems
Social Network-Based Recommender Systems

This book introduces novel techniques and algorithms necessary to support the formation of social networks. Concepts such as link prediction, graph patterns, recommendation systems based on user reputation, strategic partner selection, collaborative systems and network formation based on ‘social brokers’ are presented. Chapters...

CEH v9: Certified Ethical Hacker Version 9 Study Guide
CEH v9: Certified Ethical Hacker Version 9 Study Guide

The ultimate preparation guide for the unique CEH exam.

The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH v9 exam preparation. This comprehensive, in-depth review of CEH certification requirements is designed to help you internalize critical information using concise,...

A Data Scientist's Guide to Acquiring, Cleaning, and Managing Data in R
A Data Scientist's Guide to Acquiring, Cleaning, and Managing Data in R

The only how-to guide offering a unified, systemic approach to acquiring, cleaning, and managing data in R

Every experienced practitioner knows that preparing data for modeling is a painstaking, time-consuming process. Adding to the difficulty is that most modelers learn the steps involved in cleaning and managing data...

Windows Networking Troubleshooting (Windows Troubleshooting)
Windows Networking Troubleshooting (Windows Troubleshooting)

Learn how to set up and configure networks to create robust connections, and how to quickly diagnose and repair problems should something go wrong. Whatever version of Windows you are using, you will need a stable Internet connection and access to your company network and its shared files and resources. When a network connection fails, it can...

Result Page: Previous 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 Next 
¬©2018 LearnIT (support@pdfchm.net) - Privacy Policy