Computer Science
epub |eng | | Author:Carsten Lutz & Uli Sattler & Cesare Tinelli & Anni-Yasmin Turhan & Frank Wolter
(1) where each is either a variable or a constant, in is an atomic formula (possibly an equality statement) containing all free variables of . This fragment is “good” in ...
( Category:
Computer Science
February 20,2020 )
epub, pdf |eng | 2011-02-19 | Author:Paul McFedries
You can use a digital camera to take photos that the camera stores internally on a memory card. You can then connect the camera to your computer and transfer some ...
( Category:
Personal Computers
February 20,2020 )
epub |eng | | Author:Sandro Skansi
7.2 The Formation of the Croatian Group in Zagreb In Yugoslavia, organized effort in machine translation started in 1959, but the first individual effort was made by Vladimir Matković from ...
( Category:
Computer Science
February 20,2020 )
epub |eng | | Author:Evangelos Kapros & Maria Koutsombogera
6.5 Drafting User Experience Questionnaires Traditionally, user interaction with persons with disabilities requested for the user to tick if they were: blind or low sighted or deaf and hard of ...
( Category:
Educational Psychology
February 20,2020 )
epub |eng | | Author:Teresa Heffernan
Mind the Gap The work supporting the material development and implementation of automated robotic systems in actual military and security operations is an instance of what Stiegler calls “noetic” labor. ...
( Category:
Robotics & Automation
February 19,2020 )
epub |eng | | Author:Don Passey & Rosa Bottino & Cathy Lewin & Eric Sanchez
4 Discussion By analysing the collected feedback, it is noticeable that the model somehow surprised the interviewees. It made them think (maybe for the first time) about teaching as a ...
( Category:
Computer Science
February 19,2020 )
Information Technology in Disaster Risk Reduction by Yuko Murayama & Dimiter Velev & Plamena Zlateva
epub |eng | | Author:Yuko Murayama & Dimiter Velev & Plamena Zlateva
Input 3 “Flood susceptibility according to the overlay analysis of geological-geomorphological parameters (map results)” is described by five fuzzy membership functions: “Very low (VL)”, “Low (L)”, “Moderate (M)”, “High (H)”, ...
( Category:
Computer Science
February 19,2020 )
epub |eng | 2019-12-15 | Author:Prabath Siriwardena [Prabath Siriwardena]
( Category:
Object-Oriented Design
February 19,2020 )
epub |eng | | Author:Fuchun Sun, Dewen Hu & Huaping Liu
3 Improved PCNN Model The PCNN is a biological inspired neural network based on the experimental observations of synchronous pulse bursts in cat and monkey visual cortex [3, 4]. Differing ...
( Category:
Computer Science
February 19,2020 )
epub |eng | | Author:Alexandra Queirós & Nelson Pacheco da Rocha
The use of sensors is quite disseminated. One article (Suryadevara and Mukhopadhyay 2014) reports the use of unobtrusive sensors to monitor daily activities and to collect information related to wellness ...
( Category:
Computer Science
February 19,2020 )
epub |eng | | Author:Daniel Closa, Alex Gardiner, Falk Giemsa & Jörg Machek
(c)the purchaser sending a one time transaction code (TANC) to the seller (d)the seller forwarding the transaction code (TANC) together with details about the tangible or intangible good to the ...
( Category:
Economics
February 19,2020 )
epub |eng | 2016-12-07 | Author:Dongxing Wang
5 CONCLUSION This paper first analyzes the concept, principles and methods of geographic information service composition and points out that the purpose of it is to construct geographic information service ...
( Category:
Computer Science
February 19,2020 )
epub |eng | | Author:Nicolelis, Miguel
Forthwith Ajax, son of Telamon, slew the fair youth Simöeisius, son of Anthemion, whom his mother bore by the banks of the Simois, as she was coming down from Mount ...
( Category:
Cognitive Psychology
February 18,2020 )
epub |eng | | Author:David Evans†, Paul Gruba & Justin Zobel
Understanding Current Theory, Discoveries, and Debates Examiners will be sensitive to instances in which major contributions are neglected, or their significance downplayed. Summarize their contributions completely and honestly. But remember ...
( Category:
Educational Psychology
February 18,2020 )
epub, pdf |eng | | Author:James Dovey & Ash Furrow
Network Service Location Back in the days of yore (a.k.a. the 1990s) Apple computers used a suite of protocols called AppleTalk to communicate on a local network (or even further!). ...
( Category:
Computer Science
February 18,2020 )
Categories
AI & Machine Learning | Bioinformatics |
Computer Simulation | Cybernetics |
Human-Computer Interaction | Information Theory |
Robotics | Systems Analysis & Design |
Popular ebooks
Deep Learning with Python by François Chollet(12605)Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8315)
Test-Driven Development with Java by Alan Mellor(6858)
Data Augmentation with Python by Duc Haba(6777)
Principles of Data Fabric by Sonia Mezzetta(6518)
Learn Blender Simulations the Right Way by Stephen Pearson(6423)
Microservices with Spring Boot 3 and Spring Cloud by Magnus Larsson(6285)
Hadoop in Practice by Alex Holmes(5967)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(5817)
RPA Solution Architect's Handbook by Sachin Sahgal(5686)
Big Data Analysis with Python by Ivan Marin(5426)
The Infinite Retina by Robert Scoble Irena Cronin(5383)
Life 3.0: Being Human in the Age of Artificial Intelligence by Tegmark Max(5164)
Pretrain Vision and Large Language Models in Python by Emily Webber(4393)
Infrastructure as Code for Beginners by Russ McKendrick(4162)
Functional Programming in JavaScript by Mantyla Dan(4048)
The Age of Surveillance Capitalism by Shoshana Zuboff(3966)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3875)
Embracing Microservices Design by Ovais Mehboob Ahmed Khan Nabil Siddiqui and Timothy Oleson(3674)
Applied Machine Learning for Healthcare and Life Sciences Using AWS by Ujjwal Ratan(3654)
