Computer Science
epub |eng | | Author:Frank Steinicke
5.5 Experiment on Cognitive Demands The experiments presented above showed that users are not able to detect an inconsistency if their physical path is bent with a radius of at ...
( Category:
Web Development & Design
March 18,2018 )
epub |eng | | Author:Jesse Feiler
© Jesse Feiler 2016 Jesse FeilerLearn Apple HomeKit on iOS10.1007/978-1-4842-1527-2_5 5. Working with HomeKit Accessories Jesse Feiler1 (1)Plattsburgh, New York, USA In the previous chapters you’ve seen the basis of ...
( Category:
Mobile Phones, Tablets & E-Readers
March 18,2018 )
epub, mobi, pdf |eng | 2017-03-27 | Author:Jason Dixon
Figure 6-13. Discovering series outliers with mostDeviant() While mostDeviant() definitely has value for weeding through noisy metrics, it can resemble a blunt force object at times. Sometimes you need a ...
( Category:
Programming
March 18,2018 )
epub |eng | 2016-10-20 | Author:Gregory T Brown
Student: Make the Supplier sleep for a second before it generates a new widget? You: That’s a good idea, but we’re working in an asynchronous programming environment. So there isn’t ...
( Category:
Software
March 18,2018 )
azw3 |eng | 2017-09-22 | Author:Thierry Poibeau [Poibeau, Thierry]
Back to the Roots of the Domain? The IBM models are in some ways a return to the roots of the domain, since the techniques proposed very directly echo several ...
( Category:
Engineering
March 18,2018 )
epub |eng | | Author:Marten Deinum, Daniel Rubio & Josh Long
Properties properties = new Properties(); properties.setProperty(AvailableSettings.DIALECT, PostgreSQL95Dialect.class.getName()); properties.setProperty(AvailableSettings.SHOW_SQL, String.valueOf(true)); properties.setProperty(AvailableSettings.HBM2DDL_AUTO, "update"); return properties; }} Or you can even ignore the Hibernate configuration file by merging all the configurations into LocalSessionFactoryBean. ...
( Category:
Programming
March 18,2018 )
azw3 |eng | 2012-10-01 | Author:Gojko Adzic [Adzic, Gojko]
Further reading: Lean Startup [Ries11] Adapt [Harford11] Iterative delivery The environment in which we deliver IT products and projects changes too frequently for detailed long-term plans and upfront design. Iterative ...
( Category:
Computer Science
March 18,2018 )
epub, pdf |eng | | Author:Jean-François Le Gall
and Theorem 5.22 shows that is a continuous local martingale under Q. Furthermore the bracket of this continuous local martingale with any continuous local martingale N under Q is equal ...
( Category:
Mathematics
March 18,2018 )
epub, pdf |eng | | Author:Andrey Markelov
To be more specific, you can try this example: $ nova boot --flavor m1.tiny --image cirros-raw --security-groups apress-sgroup --key-name apresskey1 apressinstance1 +--------------------------------------+---------------------------------------------------+ | Property | Value | +--------------------------------------+---------------------------------------------------+ | OS-DCF:diskConfig ...
( Category:
Programming
March 18,2018 )
azw3 |eng | 2012-08-26 | Author:Duncan Epping & Frank Denneman [Epping, Duncan]
Level 4 (moderately aggressive) The level 4-migration threshold applies all recommendations up to priority level four. Priority-four recommendations promise a moderate improvement in the cluster’s load balance. Level 5 (aggressive) ...
( Category:
Networking & Cloud Computing
March 18,2018 )
epub |eng | 2018-01-08 | Author:Terri Favro
Every car chase in the movies versus Johnny Cab (Total Recall, 1990) In the great car chase movies—The Fast and the Furious, The Blues Brothers, Bullit, The French Connection, The ...
( Category:
Computer Science
March 18,2018 )
epub |eng | | Author:Sunil Mathew, John N. Mordeson & Davender S. Malik
Suppose that (iv) is true and (v) is not true. Fig. 4.23Theorem 4.3.1 () In this case, there exists three distinct vertices , and x such that x lies on ...
( Category:
Mathematics
March 18,2018 )
epub |eng | | Author:Stephen Statler
The Legal Framework in the United States Perhaps contrary to popular belief, the United States regulates privacy quite extensively. However, instead of comprehensive privacy laws governing all personal data processing ...
( Category:
Networking & Cloud Computing
March 18,2018 )
azw3 |eng | 2016-04-29 | Author:Humberto Cervantes & Rick Kazman [Cervantes, Humberto]
5.3.2.2 Step 3: Choose One or More Elements of the System to Refine Again, as this is greenfield development, and we are in the initial iteration, the element to refine ...
( Category:
Programming
March 18,2018 )
epub |eng | | Author:Brajesh De
Common Forms of Attack Hackers can attack to get access to the system, steal valuable information, or even bring down the system that impacts your business. The following are the ...
( Category:
Computer Science
March 17,2018 )
Categories
AI & Machine Learning | Bioinformatics |
Computer Simulation | Cybernetics |
Human-Computer Interaction | Information Theory |
Robotics | Systems Analysis & Design |
Popular ebooks
Deep Learning with Python by François Chollet(12593)Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8310)
Test-Driven Development with Java by Alan Mellor(6819)
Data Augmentation with Python by Duc Haba(6732)
Principles of Data Fabric by Sonia Mezzetta(6478)
Learn Blender Simulations the Right Way by Stephen Pearson(6386)
Microservices with Spring Boot 3 and Spring Cloud by Magnus Larsson(6250)
Hadoop in Practice by Alex Holmes(5966)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(5816)
RPA Solution Architect's Handbook by Sachin Sahgal(5648)
Big Data Analysis with Python by Ivan Marin(5405)
The Infinite Retina by Robert Scoble Irena Cronin(5340)
Life 3.0: Being Human in the Age of Artificial Intelligence by Tegmark Max(5161)
Pretrain Vision and Large Language Models in Python by Emily Webber(4373)
Infrastructure as Code for Beginners by Russ McKendrick(4141)
Functional Programming in JavaScript by Mantyla Dan(4044)
The Age of Surveillance Capitalism by Shoshana Zuboff(3964)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3855)
Embracing Microservices Design by Ovais Mehboob Ahmed Khan Nabil Siddiqui and Timothy Oleson(3657)
Applied Machine Learning for Healthcare and Life Sciences Using AWS by Ujjwal Ratan(3633)
