Computer Science
epub, pdf |eng | | Author:Stephen Smith
Adding with Carry Revisited In Chapter 2, “Loading and Adding,” we gave sample code to add two 64-bit numbers using ADDS and ADC instructions. What was lacking from this example ...
( Category:
Hacking
October 26,2019 )
epub, azw3, pdf |eng | | Author:Clifford A. Pickover
SEE ALSO Aristotle’s Organon (c. 350 BCE), Tower of Hanoi (1883), Perceptron (1957), Machine Learning (1959), Expert Systems (1965), Fuzzy Logic (1965) Joseph Licklider wrote: “The hope is that . ...
( Category:
Robotics & Automation
October 25,2019 )
epub |eng | | Author:By Audrey Tam & Matthijs Hollemans & By Matthijs Hollemans & By Chris LaPollo
When you run this code, coremltools goes through the Keras model layer-by-layer and prints its progress. You can also supply metadata, which can be helpful for the users of your ...
( Category:
Machine Theory
October 24,2019 )
epub |eng | 2019-06-23 | Author:Javier Luraschi
Figure 8-1. Spark processing raw data from a data lakes, databases, and data warehouses To support a broad variety of data sources, Spark needs to be able to read and ...
( Category:
Data Mining
October 20,2019 )
epub |eng | 2019-01-28 | Author:Lightman, Patrick [Lightman, Patrick]
( Category:
Applied Psychology
October 19,2019 )
epub |eng | 0101-01-01 | Author:Jim Highsmith [Highsmith, Jim]
Timeboxed Sizing Agile development has always included the practice of timeboxing—setting a fixed time limit to overall development efforts and letting other characteristics such as scope vary. However, timeboxing can ...
( Category:
Agile
October 19,2019 )
epub |eng | 2018-11-12 | Author:Wolf Halton
In the preceding screenshot, we can see that we have captured the Administrator login from the \\WIN10-01 workstation. This was captured when the user logged on to the domain from ...
( Category:
Network Security
October 19,2019 )
epub |eng | 2019-04-16 | Author:Joseph M. Reagle Jr. [Jr., Joseph M. Reagle]
6 Hacking Health In September 2008 a small group of enthusiasts met in the San Francisco home of Kevin Kelly, former executive editor of Wired and Cool Tools wrangler. Kelly ...
( Category:
Hacking
October 17,2019 )
epub, mobi, azw3 |eng | | Author:Melanie Mitchell
“Without Human Examples or Guidance” Unlike supervised learning, reinforcement learning holds the promise of programs that can truly learn on their own, simply by performing actions in their “environment” and ...
( Category:
Intelligence & Semantics
October 16,2019 )
epub |eng | 2014-02-23 | Author:Martyn Amos
Figure 5.1: Lipton’s graph representation for a three-bit binary string Each node has two edges emanating from it, labelled either 1 or 0 (the edges leading out of node C ...
( Category:
Cybernetics
October 14,2019 )
epub |eng | 2019-10-01 | Author:Eben Hewitt
Eventing The most basic form of asynchronous processing is publisher/subscriber, or pub/sub. One component, the event producer, publishes an event to a queue or topic. A queue, here, stores that ...
( Category:
Software Development
October 13,2019 )
epub |eng | 2019-10-07 | Author:Stuart Russell
Reasons for Caution You may find the Partnership on AI’s promises of cooperation on AI safety less than reassuring if you have been following progress in self-driving cars. That field ...
( Category:
Intelligence & Semantics
October 11,2019 )
epub, pdf |eng | 2019-02-28 | Author:Yuxi (Hayden) Liu; [Неизв.]
( Category:
Machine Theory
October 11,2019 )
epub, mobi, pdf |eng | 2019-05-14 | Author:Avimanyu Bandyopadhyay
// Setup input values for (i = 0; i < N - 1; ++i) { p[i] = 24.0; q[i] = 12.0; } // Copy inputs to device hipMemcpy(gpu_p, p, size, ...
( Category:
Systems Analysis & Design
October 11,2019 )
epub |eng | 2019-07-24 | Author:Flynn Coleman
The sooner we confront our situation and realize that there is nothing we can do to save ourselves, the sooner we can get down to the difficult task of adapting, ...
( Category:
Intelligence & Semantics
October 10,2019 )
Categories
AI & Machine Learning | Bioinformatics |
Computer Simulation | Cybernetics |
Human-Computer Interaction | Information Theory |
Robotics | Systems Analysis & Design |
Popular ebooks
Deep Learning with Python by François Chollet(12605)Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8315)
Test-Driven Development with Java by Alan Mellor(6856)
Data Augmentation with Python by Duc Haba(6777)
Principles of Data Fabric by Sonia Mezzetta(6518)
Learn Blender Simulations the Right Way by Stephen Pearson(6422)
Microservices with Spring Boot 3 and Spring Cloud by Magnus Larsson(6285)
Hadoop in Practice by Alex Holmes(5967)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(5817)
RPA Solution Architect's Handbook by Sachin Sahgal(5685)
Big Data Analysis with Python by Ivan Marin(5426)
The Infinite Retina by Robert Scoble Irena Cronin(5380)
Life 3.0: Being Human in the Age of Artificial Intelligence by Tegmark Max(5164)
Pretrain Vision and Large Language Models in Python by Emily Webber(4392)
Infrastructure as Code for Beginners by Russ McKendrick(4161)
Functional Programming in JavaScript by Mantyla Dan(4048)
The Age of Surveillance Capitalism by Shoshana Zuboff(3966)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3875)
Embracing Microservices Design by Ovais Mehboob Ahmed Khan Nabil Siddiqui and Timothy Oleson(3674)
Applied Machine Learning for Healthcare and Life Sciences Using AWS by Ujjwal Ratan(3653)
