Computers & Technology
epub |eng | | Author:Yacine Laalaoui & Nizar Bouguila
Keywords Mental searchImage retrievalBayesian modelsGeneralized inverted dirichletMixture models 1 Introduction New technological achievements during the recent years caused the appearance of large data collections that are complex to represent, analyze ...
( Category:
Computer Science
July 30,2020 )
Discrete Algebraic Methods by Volker Diekert Manfred Kufleitner Gerhard Rosenberger Ulrich Hertrampf
epub |eng | 2016-07-15 | Author:Volker Diekert,Manfred Kufleitner,Gerhard Rosenberger,Ulrich Hertrampf
6.3. Determine a nonfree monoid, in which for all elements p, q, x, y with pq = xy there is an element u such that either p = xu, y ...
( Category:
Computer Science
July 30,2020 )
epub |eng | 2020-03-13 | Author:Wilpen L. Gorr & Kristen S. Kurland
Click the Normal button and the second of the new vertex points. Drag the vertex point to the inside corner of the building as shown in the figure. Click and ...
( Category:
Information Systems
July 29,2020 )
epub, pdf |eng | 2020-03-26 | Author:Doug Lowe
It’s a RAID! I mention in Chapter 10 that individual disk drives are usually combined in groups using a technique called RAID, which stands for redundant array of inexpensive disks. ...
( Category:
Networks
July 29,2020 )
epub |eng | 2018-09-25 | Author:Irv Kalb [Irv Kalb]
Playing a Game Multiple Times In most computer games, when one round of the game is over, you get the option to play again. In the output at the beginning ...
( Category:
Object-Oriented Design
July 29,2020 )
mobi |eng | 2009-11-01 | Author:Unknown
4. Our New Sadism ENVIRONMENTAL PROBLEMS CAN BE TRACKED by doctors and government agencies whose assigned task is to care for human beings, but how do we find out about ...
( Category:
Performing Arts
July 29,2020 )
epub |eng | 2017-11-29 | Author:Unknown
Chapter 10 The Enduring Ninja During the early twentieth century an alternative view of ninjutsu began to emerge alongside the undercover techniques of the military manuals and the magic of ...
( Category:
Action & Adventure
July 29,2020 )
epub | | 2016-10-19 | Author:Dean Cheng [Cheng, Dean]
Defensive psychological warfare is another essential part of defensive information operations. For Chinese decision makers, identifying and countering underlying psychological vulnerabilities before the onset of hostilities is vital, as is ...
( Category:
Networking & Cloud Computing
July 29,2020 )
epub |eng | 2020-07-09 | Author:Aaron Guilmette [Aaron Guilmette]
Some features have dependencies on other features, either at the site or site collection level. If you encounter a feature that has dependencies, you may receive a message indicating you ...
( Category:
Business Technology
July 29,2020 )
epub |eng | 2018-06-13 | Author:Justin Jordan [Jordan, Justin]
( Category:
Fantasy
July 29,2020 )
epub |eng | 2017-01-22 | Author:Zimmer, Vincent & Rothman, Michael & Marisetty, Suresh
PollMem - Polls an address in PCI memory space until an exit condition is met, or a timeout occurs. PollIo - Polls an address in PCI I/O space until an ...
( Category:
Software Development
July 29,2020 )
epub, azw3 |eng | 2012-10-06 | Author:Karl Marx [Marx, Karl]
8. The Working Day The sum of the necessary labour and the surplus-labour, i.e., of the periods of time during which the workman replaces the value of his labour-power, and ...
( Category:
Communism & Socialism
July 29,2020 )
epub |eng | 2009-12-31 | Author:unknow
In summary, SNR can be increased by doing the following: Increasing TR Decreasing TE Using a lower BW Using volume (i.e., 3D) imaging Increasing NEX Increasing Ny Increasing Nx Increasing ...
( Category:
Graphics & Design
July 29,2020 )
epub |eng | 2020-03-16 | Author:Matthew Lysiak
By the summer of 2001, Matt had achieved a measure of wealth he never could have imagined. He had hosted his own television show, which he could accurately claim as ...
( Category:
United States
July 29,2020 )
epub |eng | | Author:German Gonzalez-Morris & Ivor Horton
Defining a Function When you create a function, you specify the function header as the first line of the function definition, followed by the executable code for the function enclosed ...
( Category:
Compilers
July 29,2020 )
Categories
Popular ebooks
Deep Learning with Python by François Chollet(27875)The Mikado Method by Ola Ellnestam Daniel Brolund(25176)
Hello! Python by Anthony Briggs(24219)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(23306)
Kotlin in Action by Dmitry Jemerov(22394)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(21859)
Dependency Injection in .NET by Mark Seemann(21750)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(20616)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(19441)
Grails in Action by Glen Smith Peter Ledbrook(18518)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(17017)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(15789)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(13639)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(11785)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(11118)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10616)
Hit Refresh by Satya Nadella(9170)
The Kubernetes Operator Framework Book by Michael Dame(8559)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8393)
Robo-Advisor with Python by Aki Ranin(8339)