Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Target Audience
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
35,046 result(s) for "COMPUTERS Machine Theory."
Sort by:
Research methods in human-computer interaction
A comprehensive guide for both quantitative and qualitative research methods, this book on the discipline of human-computer interaction (HCI) is essential reading for researchers of all types.
Tanmay teaches Julia for beginners : a springboard to machine learning for all ages
\"A Springboard to Machine Learning for All Ages clearly explains the basics of Julia programming and takes a look at cutting-edge machine learning applications. You will also discover how to interface your Julia apps with code written in Python\"--Provided by publisher.
Introduction to EEG- and speech-based emotion recognition
Introduction to EEG- and Speech-Based Emotion Recognition Methods examines the background, methods, and utility of using electroencephalograms (EEGs) to detect and recognize different emotions.By incorporating these methods in brain-computer interface (BCI), we can achieve more natural, efficient communication between humans and computers.
Network anomaly detection : a machine learning perspective
\"This book discusses detection of anomalies in computer networks from a machine learning perspective. It introduces readers to how computer networks work and how they can be attacked by intruders in search of fame, fortune, or challenge. The reader will learn how one can look for patterns in captured network traffic data to look for anomalous patterns that may correspond to attempts at unauthorized intrusion. The reader will be given a technical and sophisticated description of such algorithms and their applications in the context of intrusion detection in networks\"-- Provided by publisher.
Connected Code
Coding, once considered an arcane craft practiced by solitary techies, is now recognized by educators and theorists as a crucial skill, even a new literacy, for all children. Programming is often promoted in K-12 schools as a way to encourage \"computational thinking\" -- which has now become the umbrella term for understanding what computer science has to contribute to reasoning and communicating in an ever-increasingly digital world.InConnected Code,Yasmin Kafai and Quinn Burke argue that although computational thinking represents an excellent starting point, the broader conception of \"computational participation\" better captures the twenty-first-century reality. Computational participation moves beyond the individual to focus on wider social networks and a DIY culture of digital \"making.\" Kafai and Burke describe contemporary examples of computational participation: students who code not for the sake of coding but to create games, stories, and animations to share; the emergence of youth programming communities; the practices and ethical challenges of remixing (rather than starting from scratch); and the move beyond stationary screens to programmable toys, tools, and textiles.
Business process crowdsourcing : concept, ontology and decision support
This book conceptualises and develops crowdsourcing as an organisational business process. It argues that although for many organisations crowdsourcing still implies an immature one-off endeavour, when developed to a more repeatable business process it can harness innovation and agility. The book offers a process model to guide organisations towards the establishment of business process crowdsourcing (BPC), and empirically showcases and evaluates the model using two current major crowdsourcing projects. In order to consolidate the domain knowledge, the BPC model is turned into a heavyweight ontology capturing the concepts, hierarchical relationships and decision-making relationships necessary to establish crowdsourcing as a business process in an organisation. Lastly, based on the ontology it presents a decision tool that provides advice on making informed decisions about the performance of business process crowdsourcing activities.
Big Data, Little Data, No Data
\"Big Data\" is on the covers ofScience, Nature, theEconomist, andWiredmagazines, on the front pages of theWall Street Journaland theNew York Times.But despite the media hyperbole, as Christine Borgman points out in this examination of data and scholarly research, having the right data is usually better than having more data; little data can be just as valuable as big data. In many cases, there are no data -- because relevant data don't exist, cannot be found, or are not available. Moreover, data sharing is difficult, incentives to do so are minimal, and data practices vary widely across disciplines.Borgman, an often-cited authority on scholarly communication, argues that data have no value or meaning in isolation; they exist within a knowledge infrastructure -- an ecology of people, practices, technologies, institutions, material objects, and relationships. After laying out the premises of her investigation -- six \"provocations\" meant to inspire discussion about the uses of data in scholarship -- Borgman offers case studies of data practices in the sciences, the social sciences, and the humanities, and then considers the implications of her findings for scholarly practice and research policy. To manage and exploit data over the long term, Borgman argues, requires massive investment in knowledge infrastructures; at stake is the future of scholarship.
Beginning XML with C# 7 : XML processing and data access for C# developers
Master the basics of XML as well as the namespaces and objects you need to know in order to work efficiently with XML. You'll learn extensive support for XML in everything from data access to configuration, from raw parsing to code documentation. You will see clear, practical examples that illustrate best practices in implementing XML APIs and services as part of your C#-based Windows 10 applications. Beginning XML with C# updates Bipin Joshi's one-of-a-kind title to the new C# 7.0 programming language and .NET 4.7 Framework releases. In this update, youll discover the tight integration of XML with ADO.NET and LINQ as well as additional .NET support for today's RESTful web services and microservices. Written by a Microsoft Certified trainer and developer, this book demystifies everything to do with XML and C# 7.0. What You'll Learn Discover how XML works with the .NET Framework Read, write, access, validate, and manipulate XML documents Transform XML with XSLT Use XML serialization and web services Combine XML in ADO.NET and SQL Server Create services using Windows Communication Foundation Work with LINQ Use XML with C# in Azure and more Who This Book Is For Those with experience in C# and .NET new to the nuances of using XML. Some XML experience is helpful.
Network routing: algorithms, protocols, and architectures
Network Routing: Algorithms, Protocols, and Architectures, Second Edition explores network routing and how it can be broadly categorized into Internet routing, PSTN routing, and telecommunication transport network routing. The book systematically considers these routing paradigms, as well as their interoperability, discussing how algorithms, protocols, analysis, and operational deployment impact these approaches and addressing both macro-state and micro-state in routing. Readers will learn about the evolution of network routing, the role of IP and E.164 addressing and traffic engineering in routing, the impact on router and switching architectures and their design, deployment of network routing protocols, and lessons learned from implementation and operational experience. Numerous real-world examples bring the material alive. Bridges the gap between theory and practice in network routing, including the fine points of implementation and operational experienceRouting in a multitude of technologies discussed in practical detail, including, IP/MPLS, PSTN, and optical networkingPresents routing protocols such as OSPF, IS-IS, BGP in detailDetails various router and switch architecturesDiscusses algorithms on IP-lookup and packet classificationAccessible to a wide audience with a vendor-neutral approach