Next → | Phantom.in.the.Twilight.S01E02.VOSTFR.720p.WEBRiP.x264-PiTOU | In Search Of
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Archaeology of Household Activities
The Archaeology of Household Activities
There were a number of chapters I thought were exceptionally well written and researched... valuable reading for all classical and historic archaeologists unfamiliar with Schiffer's work or with prehistoric archaeology, where point pronveniencing, object functions, use of space, and similar foci are routine. Others will enjoy reading Chapters 3 and...
Smalltalk, Objects, and Design
Smalltalk, Objects, and Design
This reference and text treats the Smalltalk programming system and the web of object-oriented ideas within and around it. Thus it is more than a guide to the language; it also examines Smalltalk in its technical and historical setting, and along the way addresses the questions that every Smalltalk developer sooner or later naturally wonders about....
How Professionals Make Decisions (Expertise: Research and Applications)
How Professionals Make Decisions (Expertise: Research and Applications)
The essays in this collection are the product of the 2000 Naturalistic Decision Making (NDM) Conference. They attempt to discover progress made in the field since the first volume was published in 1993. Individual paper address topics such as planning under time pressure, managing complex dynamic systems and making ethical decisions.
...
Privacy Preserving Data Mining (Advances in Information Security)
Privacy Preserving Data Mining (Advances in Information Security)
Data mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, concerns are growing that use of this technology can violate individual privacy. These concerns have led to a backlash against the technology, for example, a "Data-Mining Moratorium Act" introduced in the U.S. Senate that would...
Parameterized and Exact Computation: 5th International Symposium
Parameterized and Exact Computation: 5th International Symposium

The International Symposium on Parameterized and Exact Computation (IPEC, formerly IWPEC) is an international symposium series that covers research in all aspects of parameterized and exact algorithms and complexity. Started in 2004 as a biennial workshop, it became an annual event from 2008.

The four previous meetings of the...

Control Techniques for Complex Networks
Control Techniques for Complex Networks
A representative of a major publishing house is on her way home from a conference in Singapore, excited about the possibility of a new book series. On the flight home to New York she opens her blackberry organizer, adding names of new contacts, and is disappointed to realize she may have caught the bug that was bothering her friend Alex at the...
Fast and Efficient Context-Aware Services (Wiley Series on Communications Networking & Distributed Systems)
Fast and Efficient Context-Aware Services (Wiley Series on Communications Networking & Distributed Systems)
Fast and Efficient Context-Aware Services gives a thorough explanation of the state-of-the-art in Context-Aware-Services (CAS).  The authors describe all major terms and components of CAS, defining context and discussing the requirements of context-aware applications and their use in 3rd generation services. The text covers...
Biometrics: Personal Identification in Networked Society
Biometrics: Personal Identification in Networked Society
Determining the identity of a person is becoming critical in our vastly interconnected
information society. As increasing number of biometrics-based identification systems
are being deployed for many civilian and forensic applications, biometrics and its
applications have evoked considerable interest. The current state of affairs is
...
Professional Windows PowerShell Programming: Snapins, Cmdlets, Hosts and Providers
Professional Windows PowerShell Programming: Snapins, Cmdlets, Hosts and Providers
Welcome to Professional Windows PowerShell Programming.

Way back in 2003, I attended a talk at a conference center at Microsoft by some engineers from the Microsoft Management Console team who were giving a demonstration of a prototype enhancement to MMC. The prototype was one of the early murmurs of Microsoft’s response to the
...
Conceptual Modeling of Information Systems
Conceptual Modeling of Information Systems
When designing an information system, conceptual modeling is the activity that elicits and describes the general knowledge the system needs to know. This description, called the conceptual schema, is necessary in order to develop an information system. Recently, many researchers and professionals share a vision in which the conceptual schema...
Fiber-Optic Communication Systems
Fiber-Optic Communication Systems
Since the publication of the first edition of this book in 1992, the state of the art of fiber-optic communication systems has advanced dramatically despite the relatively short period of only 10 years between the first and third editions. For example, the highest capacity of commercial fiber-optic links available in 1992 was only 2.5 Gb/s. A mere...
Pattern Recognition, Second Edition
Pattern Recognition, Second Edition
Pattern recognition is becoming increasingly important in the age of automation and information handling and retrieval.
This book provides the most comprehensive treatment available of pattern recognition, from an engineering perspective. Developed through more than ten years of teaching experience, Pattern Recognition is appropriate for both
...
Result Page: 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy