Hellfest 2018 Le festival | Download | Next Episode »
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Bad to the Bone: Crafting Electronics Systems with Beaglebone and BeagleBone Black
Bad to the Bone: Crafting Electronics Systems with Beaglebone and BeagleBone Black

This comprehensive book provides detailed materials for both novice and experienced programmers using all BeagleBone variants which host a powerful 32-bit, super-scalar TI Sitara ARM Cortex A8 processor. Authored by Steven F. Barrett and Jason Kridner, a seasoned ECE educator along with the founder of Beagleboard.org, respectively, the work...

Swarm Intelligence (The Morgan Kaufmann Series in Evolutionary Computation)
Swarm Intelligence (The Morgan Kaufmann Series in Evolutionary Computation)

Traditional methods for creating intelligent computational systems have privileged private "internal" cognitive and computational processes. In contrast, Swarm Intelligence argues that human intelligence derives from the interactions of individuals in a social world and further, that this model of...

Quantum Computer Science (Synthesis Lectures on Quantum Computing)
Quantum Computer Science (Synthesis Lectures on Quantum Computing)
In this text we present a technical overview of the emerging field of quantum computation along with new research results by the authors. What distinguishes our presentation from that of others is our focus on the relationship between quantum computation and computer science. Specifically, our emphasis is on the computational model of quantum...
Data-Intensive Text Processing with MapReduce
Data-Intensive Text Processing with MapReduce

Our world is being revolutionized by data-driven methods: access to large amounts of data has generated new insights and opened exciting new opportunities in commerce, science, and computing applications. Processing the enormous quantities of data necessary for these advances requires large clusters, making distributed computing paradigms...

Pervasive Information Architecture: Designing Cross-Channel User Experiences
Pervasive Information Architecture: Designing Cross-Channel User Experiences

I knew the Internet before it got famous. There were places but no paths, no maps, no search engines. Entry required a key in the form of an IP address and an incantation in the language of UNIX. It was a small world that felt big because it was so easy to get lost in the shadowy realm of texts and data, completely devoid of color....

Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections
Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections

The current social and economic context increasingly demands open data to improve scientific research and decision making. However, when published data refer to individual respondents, disclosure risk limitation techniques must be implemented to anonymize the data and guarantee by design the fundamental right to privacy of the subjects the...

Methods for Mining and Summarizing Text Conversations (Synthesis Lecture on Data Management)
Methods for Mining and Summarizing Text Conversations (Synthesis Lecture on Data Management)

Before the invention of the Internet and the creation of the Web, the vast majority of human conversations were in spoken form, with the only notable, but extremely limited, exception being epistolary exchanges. Some important spoken conversations, such as criminal trials and political debates (e.g., Hansard, the transcripts of...

Replicated Data Management for Mobile Computing (Synthesis Lectures on Mobile and Pervasive Computing)
Replicated Data Management for Mobile Computing (Synthesis Lectures on Mobile and Pervasive Computing)
Mobility has become increasingly important for both business and casual users of computing technology. With the widespread adoption of portable computing devices, such as laptops, PDAs, tablet computers, music players, and cell phones, people can have almost constant access to their personal data as well as to information that is shared with...
GPU-Based Techniques for Global Illumination Effects (Synthesis Lectures on Computer Graphics)
GPU-Based Techniques for Global Illumination Effects (Synthesis Lectures on Computer Graphics)
Real-time rendering poses severe computational requirements to computers. In order to maintain a continuous looking motion for the human eye, at least 20 images need to be generated in each second. An image consists of about a million pixels, which means that for a single pixel the visible point and its color should be computed in less than 50 ns...
Light Field Sampling (Synthesis Lectures on Image, Video, and Multimedia Processing)
Light Field Sampling (Synthesis Lectures on Image, Video, and Multimedia Processing)
Light field is one of the most representative image-based rendering techniques that generate novel virtual views from images instead of 3D models. The light field capture and rendering process can be considered as a procedure of sampling the light rays in the space and interpolating those in novel views. As a result, light field can be studied as a...
Modern Image Quality Assessment (Synthesis Lectures on Image, Video, & Multimedia Processing)
Modern Image Quality Assessment (Synthesis Lectures on Image, Video, & Multimedia Processing)
This book is about objective image quality assessment—where the aim is to provide computational models that can automatically predict perceptual image quality. The early years of the 21st century have witnessed a tremendous growth in the use of digital images as a means for representing and communicating information. A considerable percentage...
Learning Programming using MATLAB (Synthesis Lectures on Electrical Engineering)
Learning Programming using MATLAB (Synthesis Lectures on Electrical Engineering)
Why learn programming? There are several answers to that. Computers are ubiquitous—your car, your mp3 player, the orbiting satellites which provide us with the ability to communicate and the automatic coffee maker all use a computer of some sort. Andcomputers require programming to function. Knowing how to program provides us with a bit of...
Result Page: 8 7 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy