Search

Search Results

Results 81-90 of 340 (Search time: 0.067 seconds).
Item hits:
  • Sách/Book


  • Authors: Lourdes Ortega (2013)

  • The field of Second language acquisition (SLA, for short) investigates the human capacity to learn additional languages in late childhood, adolescence, or adulthood, after the first language --in the case of monolinguals-- or languages --in the case of bilinguals-- have already been acquired. Understanding Second Language Acquisition offers a wide-encompassing survey of this burgeoning field, its accumulated findings and proposed theories, its developed research paradigms, and its pending questions for the future. The book zooms in and out of universal, individual, and social forces, in each case evaluating the research findings that have been generated across diverse naturalistic and formal contexts for second language acquisition. It assumes no background in SLA and provides helpf...

  • Sách/Book


  • Authors: Richard Szeliski (2011)

  • Suitable for an upper-level undergraduate or graduate-level course in computer science or engineering, this textbook focuses on basic techniques that work under real-world conditions and encourages students to push their creative boundaries. Its design and exposition also make it eminently suitable as a unique reference to the fundamental techniques and current research literature in computer vision.

  • Sách/Book


  • Authors: Dan C. Marinescu (2013)

  • Cloud Computing: Theory and Practice provides students and IT professionals with an in-depth analysis of the cloud from the ground up. Beginning with a discussion of parallel computing and architectures and distributed systems, the book turns to contemporary cloud infrastructures, how they are being deployed at leading companies such as Amazon, Google and Apple, and how they can be applied in fields such as healthcare, banking and science. The volume also examines how to successfully deploy a cloud application across the enterprise using virtualization, resource management and the right amount of networking support, including content delivery networks and storage area networks. Developers will find a complete introduction to application development provided on a variety of platforms...

  • Sách/Book


  • Authors: David L. Poole (2010)

  • Recent decades have witnessed the emergence of artificial intelligence as a serious science and engineering discipline. Artificial Intelligence: Foundations of Computational Agents is a textbook aimed at junior to senior undergraduate students and first-year graduate students. It presents artificial intelligence (AI) using a coherent framework to study the design of intelligent computational agents. By showing how basic approaches fit into a multidimensional design space, readers can learn the fundamentals without losing sight of the bigger picture. The book balances theory and experiment, showing how to link them intimately together, and develops the science of AI together with its engineering applications. Although structured as a textbook, the book's straightforward, self-contain...

  • Sách/Book


  • Authors: Anany Levitin (2012)

  • Based on a new classification of algorithm design techniques and a clear delineation of analysis methods, Introduction to the Design and Analysis of Algorithms presents the subject in a coherent and innovative manner. Written in a student-friendly style, the book emphasizes the understanding of ideas over excessively formal treatment while thoroughly covering the material required in an introductory algorithms course. Popular puzzles are used to motivate students' interest and strengthen their skills in algorithmic problem solving. Other learning-enhancement features include chapter summaries, hints to the exercises, and a detailed solution manual.

  • Sách/Book


  • Authors: - (2014)

  • We can broadly define an embedded system as a microcontroller-based, software-driven, reliable, real-time control system, designed to perform a specific task. It can be thought of as a computer hardware system having software embedded in it. An embedded system can be either an independent system or a part of a large system. In this tutorial, we will explain all the steps necessary to design an embedded system and use it.

  • Sách/Book


  • Authors: N. Vlajic (2013)

  • Upon completion of this material, you should be able to: List the key managerial roles and the main types of managerial positions in an organization. • Describe the POLC project management model. • List and describe organizational/structural approaches to information security. • Explain the difference between security policy, standard and procedure. • Enlist different types of security policy that can be found in an organization