Subcategories
JOIN NOW!
https://www.facebook.com/AvaxHomeLearning/ facebook.com/AvaxHomeLearning

Docker for Data Science: Building Scalable and Extensible Data Infrastructure Around the Jupyter Notebook Server

Posted By: AvaxGenius
Docker for Data Science: Building Scalable and Extensible Data Infrastructure Around the Jupyter Notebook Server

Docker for Data Science: Building Scalable and Extensible Data Infrastructure Around the Jupyter Notebook Server By Joshua Cook
English | PDF | 2017 | 266 Pages | ISBN : 1484230116 | 6.94 MB

Learn Docker "infrastructure as code" technology to define a system for performing standard but non-trivial data tasks on medium- to large-scale data sets, using Jupyter as the master controller.
It is not uncommon for a real-world data set to fail to be easily managed. The set may not fit well into access memory or may require prohibitively long processing.

Evolutionary Computation in Combinatorial Optimization

Posted By: DZ123
Evolutionary Computation in Combinatorial Optimization

Christian Blum, Gabriela Ochoa, "Evolutionary Computation in Combinatorial Optimization"
English | 2014 | ISBN: 3662443198 | PDF | pages: 253 | 7.4 mb

Programming in Haskell (Repost)

Posted By: igor_lv
Programming in Haskell  (Repost)

Programming in Haskell - Graham Hutton
2007 | ISBN: 0521692695 | PDF/SOURCE | 190 pages | 9.3 Mb

Haskell is one of the leading languages for teaching functional programming, enabling students to write simpler and cleaner code, and to learn how to structure and reason about programs. This introduction is ideal for beginners: it requires no previous programming experience and all concepts are explained from first principles via carefully chosen examples.

Differential Privacy and Applications

Posted By: AvaxGenius
Differential Privacy and Applications

Differential Privacy and Applications By Tianqing Zhu, Gang LiWanlei Zhou, Philip S. Yu
English | PDF | 2017 | 243 Pages | ISBN : 3319620029 | 7.12 MB

This book focuses on differential privacy and its application with an emphasis on technical and application aspects. This book also presents the most recent research on differential privacy with a theory perspective. It provides an approachable strategy for researchers and engineers to implement differential privacy in real world applications.

Highlighting the Importance of Big Data Management and Analysis for Various Applications

Posted By: AvaxGenius
Highlighting the Importance of Big Data Management and Analysis for Various Applications

Highlighting the Importance of Big Data Management and Analysis for Various Applications By Mohammad Moshirpour, Behrouz Far, Reda Alhajj
English | PDF | 2017 (2018 Edition) | 168 Pages | ISBN : 3319602543 | 3.89 MB

This book addresses the impacts of various types of services such as infrastructure, platforms, software, and business processes that cloud computing and Big Data have introduced into business. Featuring chapters which discuss effective and efficient approaches in dealing with the inherent complexity and increasing demands in data science, a variety of application domains are covered. Various case studies by data management and analysis experts are presented in these chapters.

Models, Algorithms, Logics and Tools

Posted By: AvaxGenius
Models, Algorithms, Logics and Tools

Models, Algorithms, Logics and Tools: Essays Dedicated to Kim Guldstrand Larsen on the Occasion of His 60th Birthday By Prof. Luca Aceto, Giorgio Bacci, Giovanni Bacci, Anna Ingólfsdóttir, Prof. Axel Legay, Radu Mardare
English | PDF | 2017 | 666 Pages | ISBN : 3319631209 | 22.98 MB

This Festschrift is published in honor of Kim Guldstrand Larsen, one of the earliest precursors of computer science in Denmark, on the occasion of his 60th birthday. During the last three decades, Kim Guldstrand Larsen has given major contributions across a remarkably wide range of topics, including real-time, concurrent, and probabilistic models of computation, logic in computer science, and model checking. Since 1995, he has been one of the prime movers behind the model checking tool for real-time systems UPPAAL, for which he was a co-recipient of the CAV Award in 2013.

Brain-Computer Interface Research: A State-of-the-Art Summary 6

Posted By: AvaxGenius
Brain-Computer Interface Research: A State-of-the-Art Summary 6

Brain-Computer Interface Research: A State-of-the-Art Summary 6 By Dr. Christoph Guger, Dr. Brendan Allison, Ph.D. Mikhail Lebedev
English | PDF | 2017 | 138 Pages | ISBN : 331964372X | 5.52 MB

This book presents compact and informative descriptions of the most promising new projects in brain-computer interface (BCI) research. As in earlier volumes in this series, the contributions come from many of the best-known groups in BCI research. Each of these chapters provides an overview of a project that was nominated for the most prestigious award in the BCI community: the Annual BCI Research Award.

The Mathematical-Function Computation Handbook: Programming Using the MathCW Portable Software Library

Posted By: AvaxGenius
The Mathematical-Function Computation Handbook: Programming Using the MathCW Portable Software Library

The Mathematical-Function Computation Handbook: Programming Using the MathCW Portable Software Library By Prof. Nelson H.F. Beebe
English | PDF | 2017 | 1145 Pages | ISBN : 3319641093 | 29.7 MB

This highly comprehensive handbook provides a substantial advance in the computation of elementary and special functions of mathematics, extending the function coverage of major programming languages well beyond their international standards, including full support for decimal floating-point arithmetic. Written with clarity and focusing on the C language, the work pays extensive attention to little-understood aspects of floating-point and integer arithmetic, and to software portability, as well as to important historical architectures. It extends support to a future 256-bit, floating-point format offering 70 decimal digits of precision.

Algorithms on Trees and Graphs [Repost]

Posted By: hill0
Algorithms on Trees and Graphs [Repost]

Algorithms on Trees and Graphs by Gabriel Valiente
English | 4 Oct. 2013 | ISBN: 3642078095 | 508 Pages | PDF | 16.02 MB

Graph algorithms is a well-established subject in mathematics and computer science. Beyond classical application fields, such as approximation, combinatorial optimization, graphics, and operations research, graph algorithms have recently attracted increased attention from computational molecular biology and computational chemistry.

Пользовательские истории. Искусство гибкой разработки ПО

Posted By: igor_lv
Пользовательские истории. Искусство гибкой разработки ПО

Пользовательские истории. Искусство гибкой разработки ПО - Джефф Паттон
2017 | ISBN: 5496029317 | FB2/MOBI/EPUB | 288 pages | 66 Mb

Пользовательские истории – это метод описания требований к разрабатываемому продукту. В книге рассказано, как правильно использовать данную технику, чтобы сфокусироваться на поставленной задаче и пожеланиях клиента, а не распыляться на реализации второстепенных функций.

Towards Digital Optical Networks

Posted By: AvaxGenius
Towards Digital Optical Networks

Towards Digital Optical Networks: COST Action 291 Final Report By Ioannis Tomkos, Maria Spyropoulou, Karin Ennser, Martin Köhn, Branko Mikac
English | PDF | 2009 | 376 Pages | ISBN : 3642015239 | 15.28 MB

COST – the acronym for European COoperation in Science and Technology – is the oldest and widest European intergovernmental network for cooperation in - search. Established by the Ministerial Conference in November 1971, COST is presently used by the scientific communities of 35 European countries to coop- ate in common research projects supported by national funds.

Text, Speech, and Dialogue

Posted By: AvaxGenius
Text, Speech, and Dialogue

Text, Speech, and Dialogue: 20th International Conference, TSD 2017, Prague, Czech Republic, August 27-31, 2017, Proceedings By Kamil Ekštein, Václav Matoušek
English | PDF | 2017 | 536 Pages | ISBN : 3319642057 | 33.46 MB

This book constitutes the proceedings of the 20th International Conference on Text, Speech, and Dialogue, TSD 2017, held in Prague, CzechRepublic, in August 2017.

Towards Analytical Techniques for Optimizing Knowledge Acquisition, Processing, Propagation, and Use in Cyberinfrastructure and

Posted By: AvaxGenius
Towards Analytical Techniques for Optimizing Knowledge Acquisition, Processing, Propagation, and Use in Cyberinfrastructure and

Towards Analytical Techniques for Optimizing Knowledge Acquisition, Processing, Propagation, and Use in Cyberinfrastructure and Big Data By Dr. L. Octavio Lerma, Prof. Vladik Kreinovich
English | PDF | 2017 (2018 Edition) | 146 Pages | ISBN : 3319613480 | 1.9 MB

This book describes analytical techniques for optimizing knowledge acquisition, processing, and propagation, especially in the contexts of cyber-infrastructure and big data. Further, it presents easy-to-use analytical models of knowledge-related processes and their applications.

Geometric and Numerical Foundations of Movements

Posted By: AvaxGenius
Geometric and Numerical Foundations of Movements

Geometric and Numerical Foundations of Movements By Jean-Paul Laumond, Nicolas Mansard, Jean-Bernard Lasserre
English | PDF | 2017 | 417 Pages | ISBN : 3319515462 | 12.28 MB

This book aims at gathering roboticists, control theorists, neuroscientists, and mathematicians, in order to promote a multidisciplinary research on movement analysis. It follows the workshop “ Geometric and Numerical Foundations of Movements ” held at LAAS-CNRS in Toulouse in November 2015[1].

Fundamentals of Secure System Modelling

Posted By: AvaxGenius
Fundamentals of Secure System Modelling

Fundamentals of Secure System Modelling By Raimundas Matulevičius
English | PDF | 2017 | 225 Pages | ISBN : 3319617168 | 12.74 MB

This book provides a coherent overview of the most important modelling-related security techniques available today, and demonstrates how to combine them. Further, it describes an integrated set of systematic practices that can be used to achieve increased security for software from the outset, and combines practical ways of working with practical ways of distilling, managing, and making security knowledge operational.