DJ Stormtrooper - Phatt Bwoy Bass Keeps Pumpin | Lil Mac and D.J. Trick - What Ya Pumpin? | St. John - Progressions Into Trance 2
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Swarm Intelligence: Introduction and Applications (Natural Computing Series)
Swarm Intelligence: Introduction and Applications (Natural Computing Series)
The laws that govern the collective behavior of social insects, flocks of birds, or fish schools continue to mesmerize researchers. While individuals are rather unsophisticated, in cooperation they can solve complex tasks, a prime example being the ability of ant colonies to find shortest paths between their nests and food sources. Task-solving...
Nature Inspired Cooperative Strategies for Optimization (NICSO 2013): Learning, Optimization and Interdisciplinary Applications
Nature Inspired Cooperative Strategies for Optimization (NICSO 2013): Learning, Optimization and Interdisciplinary Applications

Biological and other natural processes have always been a source of inspiration for computer science and information technology. Many emerging problem solving techniques integrate advanced evolution and cooperation strategies, encompassing a range of spatio-temporal scales for visionary conceptualization of evolutionary computation.

...

Practical DevOps
Practical DevOps

Key Features

  • Get to know the background of DevOps so you understand the collaboration between different aspects of an IT organization and a software developer
  • Improve your organization's performance to ensure smooth production of software and services
  • Deploy top-quality software and...
Comparing and Merging Files with GNU diff and patch
Comparing and Merging Files with GNU diff and patch
This manual describes how to use GNU diff and patch to compare and merge files.

GNU diff and patch are free software. The term "free software" is sometimes misunderstood — it has nothing to do with price. It is about freedom. It refers to your freedom to run, copy, distribute, study, change and improve the software. With
...
Security in Computing Systems: Challenges, Approaches and Solutions
Security in Computing Systems: Challenges, Approaches and Solutions

This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of secu rity with respect to computing. Here, “computing” refers to all activities which individuals or groups directly or indirectly perform by means of computing sys tems,...

Professional Hadoop
Professional Hadoop

The professional's one-stop guide to this open-source, Java-based big data framework

Professional Hadoop is the complete reference and resource for experienced developers looking to employ Apache Hadoop in real-world settings. Written by an expert team of certified Hadoop developers, committers, and Summit...

Grouping Multidimensional Data: Recent Advances in Clustering
Grouping Multidimensional Data: Recent Advances in Clustering
Clustering is a fundamental problem that has numerous applications in many disciplines. Clustering techniques are used to discover natural groups in datasets and to identify abstract structures that might reside there, without having any background knowledge of the characteristics of the data. They have been used in various areas including...
Language and Automata Theory and Applications: 5th International Conference
Language and Automata Theory and Applications: 5th International Conference
These proceedings contain the papers that were presented at the 5th International Conference on Language and Automata Theory and Applications (LATA 2011), held in Tarragona, Spain, during May 26–31, 2011.

The scope of LATA is rather broad, including: algebraic language theory; algorithms for semi-structured
...
Influence Without Authority (2nd Edition)
Influence Without Authority (2nd Edition)
At some point, almost all of us will find ourselves in the same bind at work: we know what needs to be done and how to do it, but we can't get the right people on board. The risk is allowing frustration to become resignation—or unproductive retaliation. Fortunately, the new and improved Influence Without Authority, Second Edition offers a...
Schaum's Outline Series Theory and Problems of Projective Geometry
Schaum's Outline Series Theory and Problems of Projective Geometry
The purpose of this book is to provide a first course in Projective Geometry for undergraduate majors in mathematics and for prospective teachers of high school geometry. For the former it will furnish an introduction to the important concept of projective spaces; for the latter it will introduce a more general geometry from which,...
Handbook on International Trade Policy (Elgar Original Reference)
Handbook on International Trade Policy (Elgar Original Reference)

Controversy over the conduct and coordination of international trade policy has become a politically charged issue in current times. At the World Trade Organization Ministerial Conference in Seattle in 1999, groups from civil society went to the barricades to protest various facets of ‘globalization’. Similar spectacles have been...

Trust and Security in Collaborative Computing (Computer and Network Security)
Trust and Security in Collaborative Computing (Computer and Network Security)
Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing one of the objectives for the next generation of the Internet. It includes the functions of data communication, resource sharing, group...
Result Page: 20 19 18 17 16 15 14 13 12 11 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy