Computers & Technology
epub |eng | 2016-02-11 | Author:Labadie, Nacima & Prins, Christian & Prodhon, Caroline
4.4.2. ACO in vehicle routing problems For vehicle routing problems, an ant can, for example, build successive routes on the graph, using for instance a nearest-neighbor heuristic completed by pheromone ...
( Category:
Computer Design
March 22,2020 )
epub |eng | 2017-04-09 | Author:Cindy Bachelor [Bachelor, Cindy]
Anchor Text Linking Anchor texts will take the reader to a different page within the site, or perhaps to an entirely different site when they are clicked on. As a ...
( Category:
Marketing & Sales
March 22,2020 )
epub |eng | 2014-10-05 | Author:Julie Anderson & Hervé J. Franceschi [Anderson, Julie]
The list contains a number of sublists, separated by commas. The number of these sublists determines the number of rows in the array. For each row, the number of values ...
( Category:
Object-Oriented Design
March 22,2020 )
epub, azw3 |eng | 2015-12-06 | Author:Gilad Bracha [Bracha, Gilad]
We can write var l = new List<String>(); l is List<String>; // true l is List<int>; // false One must understand the limitations of such tests in Dart however. Because ...
( Category:
JavaScript Programming
March 22,2020 )
epub |eng | 2016-11-30 | Author:Unknown
5.3.1.3 Serial Backup FF Although the above‐mentioned backup FF in active mode operates at an equivalent rate to a standard D‐FF, the backup circuit section is constructed from multiple Si ...
( Category:
Programming
March 22,2020 )
epub |eng | 2015-12-27 | Author:Arslan Munir & Ann Gordon-Ross & Sanjay Ranka [Munir, Arslan]
7.3.7.2 Dynamic Constitution Dynamic constitution, an extension of dynamic redundancy, permits an arbitrary core on a chip to be a part of an NMR group, which increases dependability as compared ...
( Category:
Hardware & DIY
March 22,2020 )
epub |eng | | Author:Leo Corry & Raya Leviathan
( Category:
Management & Leadership
March 22,2020 )
epub |eng | | Author:Robert Lover
(b)In order for (Pa ∨ Qa) ∧ ∀xRx to be true in I, both (Pa ∨ Qa) and ∀xRx must be true in I. (c)In order for Pa ∨ Qa ...
( Category:
Programming
March 22,2020 )
epub |eng | 2017-03-21 | Author:Shiv Kumar Goyal [Goyal, Shiv Kumar]
Create compressed tar file Create gzip format tar file # tar cvfz nameoftarfile.tar.gz name_of_files Create bzip format # tar cvfj nameoftarfile.tar.bz2 name_of_files untar # tar xvf abc.tar Where xextract v ...
( Category:
Unix
March 22,2020 )
epub |eng | | Author:Sergiy Butenko, Panos M. Pardalos & Volodymyr Shylo
( Category:
Computer Science
March 22,2020 )
epub |eng | 2018-05-28 | Author:Paul Groth & Ying Ding & Michael Uschold [Paul Groth]
( Category:
Intelligence & Semantics
March 22,2020 )
epub, pdf |eng | 2016-04-09 | Author:Kusum D [D, Kusum]
Help <F1> Go To Selected Task <Ctrl> + <Shift> + <F5> Link Selected Task <Ctrl> + <F2> Unlink Selected Task <Ctrl> + <Shift> + <F2> Create a Hyperlink <Ctrl> + ...
( Category:
Business Technology
March 21,2020 )
epub |eng | 2013-03-14 | Author:Christopher Best & George Galanis & James Kerry & Robert Sottilare
Kay Stanney, Meredith Carroll, Roberto Champney, Luke DeVore, and Kelly Hale Design Interactive, Inc. Virtual Environment (VE) technologies provide unprecedented opportunities to train skill sets in highly relevant and highly ...
( Category:
Computer Science
March 21,2020 )
epub |eng | 2011-01-04 | Author:Joshua Davies
So what are these P_MD5 and P_SHA1 blocks that are XORed together to produce the final result? Well, if you recall from Chapter 4, MD5 produces 16 bytes of output, ...
( Category:
Encryption
March 21,2020 )
epub |eng | | Author:Iyad Obeid & Ivan Selesnick & Joseph Picone
(5.1) where , m = n − (D E − 1)τ, D E is the embedding dimension, and τ is the delay time. The Hurst algorithm for obtaining this exponent ...
( Category:
Computer Science
March 21,2020 )
Categories
Popular ebooks
Deep Learning with Python by François Chollet(27923)The Mikado Method by Ola Ellnestam Daniel Brolund(25231)
Hello! Python by Anthony Briggs(24264)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(23352)
Kotlin in Action by Dmitry Jemerov(22437)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(21904)
Dependency Injection in .NET by Mark Seemann(21787)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(20650)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(19477)
Grails in Action by Glen Smith Peter Ledbrook(18553)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(17020)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(15810)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(13660)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(11807)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(11133)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10618)
Hit Refresh by Satya Nadella(9176)
The Kubernetes Operator Framework Book by Michael Dame(8559)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8396)
Robo-Advisor with Python by Aki Ranin(8340)