Computer Science
epub |eng | | Author:Kripa Shanker & Ravi Shankar & Rahul Sindhwani
( Category:
Computer Science
March 18,2020 )
epub |eng | | Author:Jan Willmann & Philippe Block & Marco Hutter & Kendra Byrne & Tim Schork
2 Methodology 2.1 General Principle and Curvature Conventions The practice of land-forming to cast shell structures becomes an inspiration in the Sub-Additive process: the Philips pavilion at the Brussels Expo ...
( Category:
Computer Science
March 18,2020 )
epub, pdf |eng | 2013-01-08 | Author:Craig S. Lent [Craig S. Lent]
( Category:
Human-Computer Interaction
March 18,2020 )
epub |eng | | Author:Przemysław Ignaciuk & Andrzej Bartoszewicz
(5.160) where u(kT) specifies the number of packets to be sent by the source. For the purpose of exposition, we assume that there is no bandwidth available at the node ...
( Category:
Computer Science
March 18,2020 )
epub |eng | | Author:Michael Filimowicz & Veronika Tzankova
8.8.2 Waves, Phases or Complementary Approaches HCI has progressed from more pragmatic 1st wave, to a more analytic/metric oriented second wave and then a more phenomenological third wave. In contrast ...
( Category:
Architecture
March 18,2020 )
epub |eng | | Author:Michel O. Deville & Thomas B. Gatski
(5.266) Using appropriate averages of (5.262) with the second moments, one is led (after a few pages of algebra (sic)) to the equation (5.267) At equilibrium when there is no ...
( Category:
Computer Science
March 18,2020 )
epub |eng | | Author:Günter Ullrich
2.Technical protective measures: Adopting the necessary protective measures against risks which cannot be removed by redesign. 3.User information about remaining risks. Technical protection measures are realized by protective equipment (coverings, ...
( Category:
Robotics & Automation
March 18,2020 )
epub |eng | | Author:Luca Martino, David Luengo & Joaquín Míguez
is log- concave (i.e., ). In the literature, pdfs of this class are usually called log-log-concave densities [17], but this name does not clarify that the first logarithm function is ...
( Category:
Machine Theory
March 18,2020 )
epub |eng | | Author:James T. Streib & Takako Soma
Using this new class, a programmer could create three different instances of the PointD class as follows: PointD p1, p2, p3; p1 = new PointD(); p2 = new PointD(1.0,1.0); p3 ...
( Category:
Object-Oriented Design
March 18,2020 )
epub |eng | | Author:Tracy Hammond, Aaron Adler & Manoj Prasad
One interesting point to note with this approach is that a font type only need the split horizontal line height information for each character once for all. If someone wants ...
( Category:
Computer Science
March 18,2020 )
epub, pdf |eng | | Author:Milan Stevanovic
Windows Build Time Library Location Rules There are several ways how the information about the dynamic library required at link time may be passed to the project. Regardless of the ...
( Category:
Software Development
March 18,2020 )
epub |eng | | Author:Pierre-Yves Louis & Francesca R. Nardi
This result was further improved by [4] into an almost-sure convergence (Fig. 12.4). Fig. 12.4What Theorem 3 says, for large t 12.3.1 The Link with First-Passage Percolation The Eden model ...
( Category:
Computer Science
March 18,2020 )
Advanced Topics in Computer Vision by Giovanni Maria Farinella Sebastiano Battiato & Roberto Cipolla
epub |eng | | Author:Giovanni Maria Farinella, Sebastiano Battiato & Roberto Cipolla
7.4 Image-Based Localization A large number of interesting applications for micro aerial vehicles such as surveillance, agriculture, inspection, or simply 3D reconstruction for visualization share one common feature: The need ...
( Category:
Computer Science
March 18,2020 )
epub |eng | | Author:Francesco Camastra & Alessandro Vinciarelli
( Category:
Computer Vision & Pattern Recognition
March 18,2020 )
epub |eng | | Author:Kumar Selvarajoo
5. Jiang Z, Mak TW, Sen G, Li X (2004) Toll-like receptor 3-mediated activation of NF-kappaB and IRF3 diverges at Toll-IL-1 receptor domain-containing adapter inducing IFN-beta. Proc Natl Acad Sci ...
( Category:
Computer Science
March 18,2020 )
Categories
AI & Machine Learning | Bioinformatics |
Computer Simulation | Cybernetics |
Human-Computer Interaction | Information Theory |
Robotics | Systems Analysis & Design |
Popular ebooks
Deep Learning with Python by François Chollet(12603)Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8315)
Test-Driven Development with Java by Alan Mellor(6847)
Data Augmentation with Python by Duc Haba(6770)
Principles of Data Fabric by Sonia Mezzetta(6509)
Learn Blender Simulations the Right Way by Stephen Pearson(6414)
Microservices with Spring Boot 3 and Spring Cloud by Magnus Larsson(6276)
Hadoop in Practice by Alex Holmes(5966)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(5816)
RPA Solution Architect's Handbook by Sachin Sahgal(5678)
Big Data Analysis with Python by Ivan Marin(5422)
The Infinite Retina by Robert Scoble Irena Cronin(5374)
Life 3.0: Being Human in the Age of Artificial Intelligence by Tegmark Max(5164)
Pretrain Vision and Large Language Models in Python by Emily Webber(4390)
Infrastructure as Code for Beginners by Russ McKendrick(4159)
Functional Programming in JavaScript by Mantyla Dan(4046)
The Age of Surveillance Capitalism by Shoshana Zuboff(3965)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3872)
Embracing Microservices Design by Ovais Mehboob Ahmed Khan Nabil Siddiqui and Timothy Oleson(3669)
Applied Machine Learning for Healthcare and Life Sciences Using AWS by Ujjwal Ratan(3650)
