Computer Science
epub |eng | 2018-03-13 | Author:Art Carapola [Carapola, Art]
Data Center operators want to allocate these costs in as fair a way as possible. If they allocated the costs by the amount of relative space that each tenant has ...
( Category:
Computer Science
February 28,2020 )
epub |eng | 2012-06-17 | Author:Unknown
Provision of X-rays by other combatant nations At the outset of hostilities in 1914, the British Army was well equipped to deal with the demands of radiology and this, in ...
( Category:
Performing Arts
February 28,2020 )
epub |eng | | Author:Vyvyan Evans [Evans, Vyvyan]
CHAPTER 5 Colourful Writing Predictive typing has long been a staple of smartphones, and even mobile phones back in the day before they were smart. It works by figuring out ...
( Category:
Communication & Media Studies
February 28,2020 )
epub |eng | | Author:Mangalam Nandakumar
Why do well-made products fail? “What’s really going to bake your noodle later on is, would you still have broken it if I hadn’t said anything?”– Oracle, The Matrix Charles ...
( Category:
Enterprise Applications
February 28,2020 )
epub |eng | 0101-01-01 | Author:Norbert Wiener
V I have said that the reprobation attaching in former ages to the sin of sorcery attaches now in many minds to the speculations of modern cybernetics. For make no ...
( Category:
Science & Religion
February 28,2020 )
epub |eng | 2012-05-01 | Author:Parreiras, Fernando S.
Figures 10.2, 10.3 and 10.4 depict three concrete diagrams and show how they depend on each other. The UML use case diagram depicts use cases from the perspective of two ...
( Category:
Computer Science
February 28,2020 )
epub |eng | 2018-11-29 | Author:Sandipan Dey [Sandipan Dey]
( Category:
Computer Vision & Pattern Recognition
February 28,2020 )
epub |eng | 2019-09-07 | Author:Bassens Aglaé & Beyleveld Grant & Jon Krohn [Bassens Aglaé]
( Category:
Intelligence & Semantics
February 28,2020 )
epub |eng | 2009-06-17 | Author:Conway, Damian [Damian Conway]
Backtracking Prevent useless backtracking. In the final example of the previous guideline: qr{ with \s+ (?: each \s+ (?:$EXPR | $VAR \s* in \s* [(] $LIST [)] ) | [(] ...
( Category:
Software Development
February 28,2020 )
epub |eng | 2012-12-05 | Author:Kirk, David B., Hwu, Wen-mei W. & Wen-mei W. Hwu
Figure 10.14 A sequential loop that implements SpMV/COO. The loop is extremely simple. It iterates through all the data elements and performs the multiply and accumulate operations on the appropriate ...
( Category:
Microprocessor Design
February 28,2020 )
epub |eng | | Author:Marie Drennan,Yuri Baranovsky,Vlad Baranovsky & Yuri Baranovsky & Vlad Baranovsky
Mirror In many sitcoms and dramas that you’ve seen, there are characters who were clearly designed as opposites of the main character. It’s the classic “odd couple” dynamic: two people ...
( Category:
Intelligence & Semantics
February 28,2020 )
epub |eng | 1989-02-26 | Author:Penrose, Roger
Fig. 6.8. A probability amplitude represented as a point z within the unit circle in the Argand plane. The squared distance |z|2 from the centre can become an actual probability ...
( Category:
Intelligence & Semantics
February 27,2020 )
epub, pdf |eng | | Author:Perez, Antonio Santiago
Chapter 5. Adding Controls In this chapter we will cover: Adding some visual controls Adding the NavigationHistory control Working with geolocation Placing controls outside the map Editing features on multiple ...
( Category:
Programming Languages
February 27,2020 )
epub |eng | | Author:Laganiere, Robert
Clearly, the noisy pixels shifted the mean value of neighboring pixels. As a result, the noise is still visible even if it has been blurred by the mean filter. The ...
( Category:
Networks
February 27,2020 )
epub |eng | 2007-02-26 | Author:Sanghera, Paul [Sanghera, Dr. Paul]
Planning the Site Analysis Due to its very nature, an RFID system is almost always installed in an already existing infrastructure that contains other systems and devices. The purpose of ...
( Category:
Security Certifications
February 27,2020 )
Categories
AI & Machine Learning | Bioinformatics |
Computer Simulation | Cybernetics |
Human-Computer Interaction | Information Theory |
Robotics | Systems Analysis & Design |
Popular ebooks
Deep Learning with Python by François Chollet(12605)Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8315)
Test-Driven Development with Java by Alan Mellor(6856)
Data Augmentation with Python by Duc Haba(6777)
Principles of Data Fabric by Sonia Mezzetta(6518)
Learn Blender Simulations the Right Way by Stephen Pearson(6422)
Microservices with Spring Boot 3 and Spring Cloud by Magnus Larsson(6285)
Hadoop in Practice by Alex Holmes(5967)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(5817)
RPA Solution Architect's Handbook by Sachin Sahgal(5685)
Big Data Analysis with Python by Ivan Marin(5426)
The Infinite Retina by Robert Scoble Irena Cronin(5380)
Life 3.0: Being Human in the Age of Artificial Intelligence by Tegmark Max(5164)
Pretrain Vision and Large Language Models in Python by Emily Webber(4392)
Infrastructure as Code for Beginners by Russ McKendrick(4161)
Functional Programming in JavaScript by Mantyla Dan(4048)
The Age of Surveillance Capitalism by Shoshana Zuboff(3966)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3875)
Embracing Microservices Design by Ovais Mehboob Ahmed Khan Nabil Siddiqui and Timothy Oleson(3674)
Applied Machine Learning for Healthcare and Life Sciences Using AWS by Ujjwal Ratan(3653)
