Computer Science
epub |eng | 2015-11-12 | Author:Thomas W. Malone & Michael S. Bernstein [Malone, Thomas W.]

Cognitive Psychology Editors’ Introduction Even though the field of collective intelligence sees intelligence in unusual places, any comprehensive survey of the field should certainly include the first place where we ...
( Category: Behavioral Sciences August 3,2018 )
epub |eng | 2015-12-23 | Author:Steve Martinelli, Henry Nash, Brad Topol

GET /v3/users/d19cac8f7ef3e6de36a47b85f306f137 How will Keystone know which domain/LDAP server to talk to in order to find this user? For performance reasons, searching them all is not a viable option. This ...
( Category: Programming July 31,2018 )
epub, azw3, mobi |eng | 2014-11-21 | Author:Roger Barga & Valentine Fontama & Wee Hyong Tok [Barga, Roger]

Decision Trees Decision tree algorithms are hierarchical techniques that work by splitting the dataset iteratively based on certain statistical criteria. The goal of decision trees is to maximize the variance ...
( Category: Software July 29,2018 )
epub |eng | 2011-08-22 | Author:Francesco Bergadano

instantiates to the following two clauses: append(X,Y,Z) :- cons(X1,X2,X), no_op(X1,Y). append(X2,Y,W), cons(X1,W,Z). where we may think of a given background knowledge including: cons(X.Y.[XIY]). Inenlber(X. [XIY] ). n1eci1ber(X.[_ Y]) :- inc~iiilx'r(X,Y). ...
( Category: Computer Science July 29,2018 )
epub |eng | 2017-05-01 | Author:Garry Kasparov [Kasparov, Garry]

CHAPTER 8 DEEPER BLUE KEN THOMPSON designed the revolutionary chess machine Belle, whose chips Deep Blue’s were based on, while working at Bell Laboratories in New Jersey, the famous “Idea ...
( Category: Computer Science July 28,2018 )
epub |eng | 2012-02-03 | Author:Kernighan, Brian [Kernighan, Brian]

7.5 Conditionals This next example does a slightly different job, finding the largest of all the numbers that were provided. It's an excuse to introduce another control-flow statement, if-else, which ...
( Category: Computer Science July 25,2018 )
epub |eng | 2015-06-04 | Author:Hollos, Stefan & Hollos, J. Richard

Principle of Maximum Entropy We end the chapter by looking at a simple example using the principle of maximum entropy. This is a technique for inferring a probability distribution that ...
( Category: Computer Science July 25,2018 )
epub |eng | 2014-07-24 | Author:Weitz, Stefan [WEITZ, STEFAN]

What About People As a Search Engine? Beyond more advanced technology, there is an interesting interim step in applying human characteristics to intelligent systems. So far, we have talked about ...
( Category: Marketing & Sales July 25,2018 )
epub |eng | 2018-06-25 | Author:Benjamin Bengfort

Figure 8-2. Force-directed ego graph for the Wizard of Oz Note The construction and utility of property graphs as well as NetworkX’s add_edge, ego_graph and draw methods will be discussed ...
( Category: Programming Languages July 23,2018 )
epub |eng | 2011-07-20 | Author:Sheppard, Rob

What to Do with Contrast Your eyes can see more detail in a contrasty scene such as night scenes than the camera can, but this goes beyond the night. You ...
( Category: Photography & Video July 21,2018 )
epub |eng | 2015-05-31 | Author:Morgan Quigley, Brian Gerkey & William D. Smart

Actuation: Manipulator Arm Many robots need to manipulate objects in their environment. For example, packing or palletizing robots sit on the end of production lines, grab items coming down the ...
( Category: Programming July 21,2018 )
epub, mobi |eng | 2018-04-24 | Author:Douwe Osinga

python -m bin.infer \ --tasks " - class: DecodeText" \ --model_dir $SEQ2SEQROOT/model_large \ --input_pipeline " class: ParallelTextInputPipeline params: source_files: - '/tmp/test_questions.txt'" A simple conversation works: > hi hi > what ...
( Category: Computer Science July 20,2018 )
epub |eng | 2017-12-22 | Author:Omar Trejo Navarro [Navarro, Omar Trejo]

Extending our analysis with cosine similarity Now we proceed to another technique familiar in linear algebra which operates on a vector space. The technique is known as cosine similarity (CS), ...
( Category: Software July 19,2018 )
epub |eng | 1999-02-15 | Author:N. Katherine Hayles [Hayles, N. Katherine]

The Schizoid Woman (De)Constructs Male Subjectivity Patricia Warrick has insightfully argued that Dick’s fiction is structured as a series of reversals designed to defeat the reader’s expectation that it is ...
( Category: Computer Science July 19,2018 )
epub, azw3 |eng | 0101-01-01 | Author:Jim Corbett [Corbett, Jim]

CYANIDE POISONING As I was returning to the Inspection Bungalow after visiting the goat that had been killed the previous night, I was informed in the village that my presence ...
( Category: Hunting & Fishing July 18,2018 )