Computers & Technology
epub |eng | 2014-10-18 | Author:Jim Sizemore
Click Run. MATLAB displays a message telling you that the SayHello2() function requires input, as shown in Figure 9-10. You see this message every time you try to use Run ...
( Category:
Engineering
August 22,2016 )
epub |eng | | Author:Gee, James;
Chapter 12 Discourse analysis Stories go to school Abstract This chapter deals with the discourse analysis of narratives and stories. It argues that everyday stories very often make deep sense ...
( Category:
Philosophy & Social Aspects
August 21,2016 )
epub |eng | | Author:Tieniu Tan, Guoping Wang, Shengjin Wang, Yue Liu, Xiaoru Yuan, Ran He & Sheng Li
(2)Sequencing in descending order, deleting repeated gradient values, only keeping different gradient values, and at the same time counting the frequency of each value occurring in , to get gradient ...
( Category:
Computers & Technology
August 13,2016 )
epub |eng | | Author:Veli Mäkinen, Simon J. Puglisi & Leena Salmela
(2)Mathematics Institute, University of Warwick, Coventry, CV4 7AL, UK (3)CNRS, LAMSADE UMR 7243, University Paris-Dauphine, Paris, France (4)Department of Informatics, University of Fribourg, Bd de Pérolles 90, 1700 Fribourg, Switzerland ...
( Category:
Computers & Technology
August 13,2016 )
epub |eng | 2016-08-09 | Author:Tom Chatfield
59. Facepalms and *Acting Out* Some of the central innovations of online communications lie in techniques for adding emotional and physical information to a conversation typed while seated at a ...
( Category:
Etymology
August 12,2016 )
epub |eng | | Author:Annie Foret, Glyn Morrill, Reinhard Muskens, Rainer Osswald & Sylvain Pogodalla
These are the standard rules of L / L1 (roughly as in [13]). We have rules to introduce either slash and ‘’ both on the right hand side of and ...
( Category:
Computers & Technology
August 10,2016 )
epub |eng | | Author:Adalbert F.X. Wilhelm & Hans A. Kestler
3 Experiments During the experiment three data sets were used. All were obtained from popular repositories and related to the areas of analytical CRM. The first model and the second ...
( Category:
Education & Reference
August 10,2016 )
epub |eng | | Author:Sven Hartmann & Hui Ma
5 Conclusion In this paper, we presented a novel model-based approach to database stress testing, MoDaST. It leverages a state machine to figure out the internal state of DBMS at ...
( Category:
Computers & Technology
August 9,2016 )
epub |eng | | Author:Sanjay Madria & Takahiro Hara
To detect anomalies in time and obtain a better accuracy, we make use of the so-called Lambda architecture [27], that can detect anomalies near real-time, and can efficiently update detection ...
( Category:
Computers & Technology
August 9,2016 )
epub |eng | 2013-03-17 | Author:Siemens, Ray; Schreibman, Susan; & Susan Schreibman
16 Private Public Reading: Readers in Digital Literature Installation Mark Leahy Introduction This chapter sets the genre of installed digital literature in the context of other disciplines and art forms. ...
( Category:
Databases & Big Data
August 7,2016 )
epub |eng | 2011-12-21 | Author:Peder Jungck; Ralph Duncan; Dwight Mulcahy
A pragma may appear in a packetC module at any location that a packetC declaration or statement could legally appear. Best practices for pragmas encourage locating or including them near ...
( Category:
Software Development
August 6,2016 )
epub |eng | 2016-02-13 | Author:Szczepaniak, John
( Category:
Games & Strategy Guides
August 3,2016 )
epub |eng | | Author:Neal Bascomb [Bascomb, Neal]
18 Sabotage RØNNEBERG RECHECKED THE plant’s basement and first-floor doors himself. Kayser stayed with him, searching the shadows for any sign of an approaching patrol. Strømsheim and Idland looked for ...
( Category:
Industrial, Manufacturing & Operational Systems
August 3,2016 )
epub |eng | 2016-06-14 | Author:Dan Woods
Here we use the StartEvent provided to the onStart method to get access to the server registry and resolve the Sql object. This is the first introduction to working with ...
( Category:
Programming
August 2,2016 )
epub |eng | 2016-07-26 | Author:Allen B. Downey
# class Dct def make_wave(self): n = len(self.hs) ys = scipy.fftpack.idct(self.hs, type=2) / 2 / n return Wave(ys, framerate=self.framerate) By default, the inverse DCT doesn’t normalize the result, so we ...
( Category:
Signal Processing
July 31,2016 )
Categories
Popular ebooks
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16906)Deep Learning with Python by François Chollet(15486)
The Mikado Method by Ola Ellnestam Daniel Brolund(12746)
Hello! Python by Anthony Briggs(12601)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(11892)
Dependency Injection in .NET by Mark Seemann(11698)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10534)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(10506)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(10226)
Grails in Action by Glen Smith Peter Ledbrook(9815)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(9539)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(9249)
Hit Refresh by Satya Nadella(9040)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(8548)
The Kubernetes Operator Framework Book by Michael Dame(8480)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8301)
Robo-Advisor with Python by Aki Ranin(8256)
Kotlin in Action by Dmitry Jemerov(8248)
Practical Computer Architecture with Python and ARM by Alan Clements(8228)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(8199)