Computer Science
epub |eng | | Author:Corey Mead
More Than a Game To find out how VBS2 training works in practice, I paid a visit to Fort Campbell, Kentucky, home of the 101st Airborne Division Screaming Eagles—and, since ...
( Category:
Game Programming
April 14,2014 )
epub, mobi |eng | 2012-04-10 | Author:Kevin Yank [Yank, Kevin]
Note: Regular Expressions in Double Quoted Strings All the regular expressions we’ve seen so far in this chapter have been expressed as single-quoted PHP strings. The automatic variable substitution provided ...
( Category:
MySQL
April 11,2014 )
epub |eng | 2014-01-27 | Author:Raul Sidnei Wazlawick
6.9 The process so far 6.10 Questions 1. Try to imagine a real world situation where the right structure to be used is a sequence. Remember that a real sequence ...
( Category:
Object-Oriented Design
April 10,2014 )
epub, mobi |eng | 2012-01-12 | Author:Borenstein, Greg [Greg Borenstein]
Figure 4-6. The red dot shows up immediately after the completion of calibration, and our sketch begins receiving joint data. Having been converted from real-world to projective coordinates, the joint ...
( Category:
C & C++ Windows Programming
April 6,2014 )
epub |eng | 2012-03-04 | Author:Schwartz, Baron, Tkachenko, Vadim, Zaitsev, Peter & Peter Zaitsev & Vadim Tkachenko [Baron Schwartz]
When Should You Use Flash? The most obvious use case for solid-state storage is any workload that has a lot of random I/O. Random I/O is usually caused by the ...
( Category:
Performance Optimization
April 6,2014 )
epub, pdf |eng | 2014-04-05 | Author:Matt Richardson
Analog Input As discussed in Chapter 3, a digital pin (input or output) represents information as either on or off. But there are plenty of inputs that could have a ...
( Category:
Mobile & Wireless
April 6,2014 )
epub |eng | 2009-02-08 | Author:Hamill, Paul [Paul Hamill]
assertNotAlmostEqual(self, first, second, places=7, msg=None) assertNotAlmostEquals(self, first, second, places=7, msg=None) failIfAlmostEqual(self, first, second, places=7, msg=None) Test fails if first and second are equal after being rounded to places decimal places. ...
( Category:
Computer Science
April 6,2014 )
epub |eng | 2009-03-16 | Author:Hewitt, Eben [Eben Hewitt]
Note There is a bit of a gray area with respect to proper header usage. Many public services, such as some posted by the United States Post Office, use what ...
( Category:
Client-Server Systems
April 5,2014 )
epub |eng | 2011-10-24 | Author:White, John Myles, Conway, Drew [Drew Conway and John Myles White]
* * * [6] The same person who invented the word “bit”. [7] When you’re interested, we’d recommend reading Judea Pearl’s Causality Pea05. Chapter 3. Classification: Spam Filtering This or ...
( Category:
Computer Science
April 5,2014 )
epub |eng | 2011-03-02 | Author:Teetor, Paul [Paul Teetor]
9.12. Forming a Confidence Interval for a Proportion Problem You have a sample of values from a population consisting of successes and failures. Based on the sample data, you want ...
( Category:
Software Development
April 5,2014 )
epub, mobi, pdf |eng | 2013-12-06 | Author:Broad, James, Bindner, Andrew & Andrew Bindner
Most transfers will fail, however, if the target name server is misconfigured. The entire name servers record set will be transferred to the local Kali Linux computer. When using this ...
( Category:
Hacking
April 1,2014 )
epub |eng | 2011-03-30 | Author:Ratner, Bruce [Ratner, Bruce]
TABLE 14.7 Logistic Regression of Response on X2, X1X2, and X2_SQ TABLE 14.8 Classification Table of Model with X2, X1X2, and X2_SQ I conclude that the relationship is quadratic, and ...
( Category:
Probability & Statistics
March 31,2014 )
epub |eng | 2005-08-12 | Author:Ed Burnette [Unknown]
7.7. Expressions View The Expressions view (in the Debug perspective) shows a list of expressions and their values in the debugger. Use it to examine program states persistently as you ...
( Category:
Object-Oriented Design
March 31,2014 )
epub |eng | 2008-10-15 | Author:Kaehler, Adrian, Bradski, Gary & Adrian Kaehler [Gary Bradski]
Identifying the bounding triangle or edges on the convex hull and walking the hull Recall that we used a bounding rectangle rect to initialize the Delaunay triangulation with the call ...
( Category:
DSPs
March 31,2014 )
Categories
AI & Machine Learning | Bioinformatics |
Computer Simulation | Cybernetics |
Human-Computer Interaction | Information Theory |
Robotics | Systems Analysis & Design |
Popular ebooks
Deep Learning with Python by François Chollet(12571)Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8300)
Test-Driven Development with Java by Alan Mellor(6721)
Data Augmentation with Python by Duc Haba(6637)
Principles of Data Fabric by Sonia Mezzetta(6387)
Learn Blender Simulations the Right Way by Stephen Pearson(6284)
Microservices with Spring Boot 3 and Spring Cloud by Magnus Larsson(6158)
Hadoop in Practice by Alex Holmes(5958)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(5806)
RPA Solution Architect's Handbook by Sachin Sahgal(5553)
Big Data Analysis with Python by Ivan Marin(5363)
The Infinite Retina by Robert Scoble Irena Cronin(5247)
Life 3.0: Being Human in the Age of Artificial Intelligence by Tegmark Max(5147)
Pretrain Vision and Large Language Models in Python by Emily Webber(4327)
Infrastructure as Code for Beginners by Russ McKendrick(4088)
Functional Programming in JavaScript by Mantyla Dan(4038)
The Age of Surveillance Capitalism by Shoshana Zuboff(3950)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3802)
Embracing Microservices Design by Ovais Mehboob Ahmed Khan Nabil Siddiqui and Timothy Oleson(3606)
Applied Machine Learning for Healthcare and Life Sciences Using AWS by Ujjwal Ratan(3578)
