Browse Results

Showing 24,401 through 24,425 of 53,677 results

C Pocket Reference: C Syntax and Fundamentals

by Peter Prinz Ulla Kirch-Prinz

C is one of the oldest programming languages and still one of the most widely used. Whether you're an experienced C programmer or you're new to the language, you know how frustrating it can be to hunt through hundreds of pages in your reference books to find that bit of information on a certain function, type or other syntax element. Or even worse, you may not have your books with you. Your answer is the C Pocket Reference. Concise and easy to use, this handy pocket guide to C is a must-have quick reference for any C programmer. It's the only C reference that fits in your pocket and is an excellent companion to O'Reilly's other C books. Ideal as an introduction for beginners and a quick reference for advanced programmers, the C Pocket Reference consists of two parts: a compact description of the C language and a thematically structured reference to the standard library. The representation of the language is based on the ANSI standard and includes extensions introduced in 1999. An index is included to help you quickly find the information you need. This small book covers the following: C language fundamentals Data types Expressions and operators C statements Declarations Functions Preprocessor directives The standard library O'Reilly's Pocket References have become a favorite among programmers everywhere. By providing a wealth of important details in a concise, well-organized format, these handy books deliver just what you need to complete the task at hand. When you've reached a sticking point in your work and need to get to a solution quickly, the new C Pocket Reference is the book you'll want to have.

Assortment and Merchandising Strategy: Building a Retail Plan to Improve Shopper Experience

by Constant Berkhout

Demonstrating how retailers can tap into shoppers’ needs for variety without increasing complexity and stress, this innovative book combines cutting-edge research with hands-on, practical frameworks. Experts in the retail sector have long been convinced that small assortments are more appealing to shoppers than large selections of products; in other words, less is more. However, the human brain has an innate need for variety. Addressing this challenge Constant Berkhout offers practical merchandising guidelines both for stores and online retailers. Indeed, studies show that it is not the actual size of assortment that drives traffic to online stores, but the perception of assortment variety. The author illustrates how decisions around assortment and visual merchandising must be made in conjunction with each other, rather than separately, and provides a step-by-step plan to do so. Grounded on shopper needs, emotions and behaviours that apply to both online and brick-and-mortar stores, this book integrates assortment and merchandise thinking and takes a human and shopper perspective. With practical frameworks that can easily be implemented in real-life situations along with examples from a number of retail sectors, Assortment and Merchandising Strategy provides a deeper and much-needed understanding of how shoppers process information, and the strategies that retailers must adopt in order to satisfy and retain their customers.

Data Analysis in Bi-partial Perspective: Clustering and Beyond (Studies in Computational Intelligence #818)

by Jan W. Owsiński

This book presents the bi-partial approach to data analysis, which is both uniquely general and enables the development of techniques for many data analysis problems, including related models and algorithms. It is based on adequate representation of the essential clustering problem: to group together the similar, and to separate the dissimilar. This leads to a general objective function and subsequently to a broad class of concrete implementations. Using this basis, a suboptimising procedure can be developed, together with a variety of implementations.This procedure has a striking affinity with the classical hierarchical merger algorithms, while also incorporating the stopping rule, based on the objective function. The approach resolves the cluster number issue, as the solutions obtained include both the content and the number of clusters. Further, it is demonstrated how the bi-partial principle can be effectively applied to a wide variety of problems in data analysis.The book offers a valuable resource for all data scientists who wish to broaden their perspective on basic approaches and essential problems, and to thus find answers to questions that are often overlooked or have yet to be solved convincingly. It is also intended for graduate students in the computer and data sciences, and will complement their knowledge and skills with fresh insights on problems that are otherwise treated in the standard “academic” manner.

Word Hacks: Tips & Tools for Taming Your Text (Hacks)

by Andrew Savikas

As one of the applications in Microsoft Office, Word is the dominant word-processing program for both Windows and Mac users. Millions of people around the globe use it. But many, if not most, of them barely skim the surface of what is possible with Microsoft Word. Seduced by the application's supposed simplicity, they settle for just what's obvious--even if it doesn't satisfy their wants and needs. They may curse the wretched Bullets and Numbering buttons multiple times a day or take hours to change the font size of every heading in a lengthy report, yet they're reluctant to dig deeper to take advantage of Word's immense capabilities and limitless customization tools. Let Word Hacks be your shovel. Let it carve your way into Word and make this most popular and powerful application do precisely what you want it to do. Filled with insider tips, tools, tricks, and hacks, this book will turn you into the power user you always wanted to be. Far beyond a tutorial, Word Hacks assumes you have a solid working knowledge of the application and focuses on showing you exactly how to accomplish your pressing tasks, address your frequent annoyances, and solve even your most complex problems. Author Andrew Savikas examines Word's advanced (and often hidden) features and delivers clever, time-saving hacks on taming document bloat, customization, complex search and replace, Tables of Contents and indexes, importing and exporting files, tables and comments, and even using Google as a dictionary! With him as your guide, you'll soon be understanding--and hacking--Word in ways you never thought possible. Covering Word 2000, 2002 and Word 2003, Word Hacks exposes the inner workings of Word and releases your inner hacker; with it, you will be equipped to take advantage of the application s staggering array of advanced features that were once found only in page layout programs and graphics software and turning Word into your personal productivity powerhouse.

Learning GNU Emacs: A Guide to Unix Text Processing

by James Elliott Debra Cameron Bill Rosenblatt Eric S. Raymond Marc Loy

GNU Emacs is the most popular and widespread of the Emacs family of editors. It is also the most powerful and flexible. Unlike all other text editors, GNU Emacs is a complete working environment--you can stay within Emacs all day without leaving. Learning GNU Emacs, 3rd Edition tells readers how to get started with the GNU Emacs editor. It is a thorough guide that will also "grow" with you: as you become more proficient, this book will help you learn how to use Emacs more effectively. It takes you from basic Emacs usage (simple text editing) to moderately complicated customization and programming. The third edition of Learning GNU Emacs describes Emacs 21.3 from the ground up, including new user interface features such as an icon-based toolbar and an interactive interface to Emacs customization. A new chapter details how to install and run Emacs on Mac OS X, Windows, and Linux, including tips for using Emacs effectively on those platforms. Learning GNU Emacs, third edition, covers: How to edit files with Emacs Using the operating system shell through Emacs How to use multiple buffers, windows, and frames Customizing Emacs interactively and through startup files Writing macros to circumvent repetitious tasks Emacs as a programming environment for Java, C++, and Perl, among others Using Emacs as an integrated development environment (IDE) Integrating Emacs with CVS, Subversion and other change control systems for projects with multiple developers Writing HTML, XHTML, and XML with Emacs The basics of Emacs Lisp The book is aimed at new Emacs users, whether or not they are programmers. Also useful for readers switching from other Emacs implementations to GNU Emacs.

Hands-On Network Programming with C: Learn socket programming in C and write secure and optimized network code

by Lewis Van Winkle

A comprehensive guide to programming with network sockets, implementing Internet protocols, designing IoT devices, and much more with CKey FeaturesLeverage your C or C++ programming skills to build powerful network applicationsGet to grips with a variety of network protocols that allow you to load web pages, send emails, and do much moreWrite portable network code for operating systems such as Windows, Linux, and macOSBook DescriptionNetwork programming, a challenging topic in C, is made easy to understand with a careful exposition of socket programming APIs. This book gets you started with modern network programming in C and the right use of relevant operating system APIs.This book covers core concepts, such as hostname resolution with DNS, that are crucial to the functioning of the modern web. You’ll delve into the fundamental network protocols, TCP and UDP. Essential techniques for networking paradigms such as client-server and peer-to-peer models are explained with the help of practical examples. You’ll also study HTTP and HTTPS (the protocols responsible for web pages) from both the client and server perspective. To keep up with current trends, you’ll apply the concepts covered in this book to gain insights into web programming for IoT. You’ll even get to grips with network monitoring and implementing security best practices.By the end of this book, you’ll have experience of working with client-server applications, and be able to implement new network programs in C.The code in this book is compatible with the older C99 version as well as the latest C18 and C++17 standards. Special consideration is given to writing robust, reliable, and secure code that is portable across operating systems, including Winsock sockets for Windows and POSIX sockets for Linux and macOS.What you will learnUncover cross-platform socket programming APIsImplement techniques for supporting IPv4 and IPv6Understand how TCP and UDP connections work over IPDiscover how hostname resolution and DNS workInterface with web APIs using HTTP and HTTPSAcquire hands-on experience with Simple Mail Transfer Protocol (SMTP)Apply network programming to the Internet of Things (IoT)Who this book is forIf you're a developer or a system administrator who wants to enter the world of network programming, this book is for you. Basic knowledge of C programming is assumed.

Machine Learning with R: Expert techniques for predictive modeling, 3rd Edition

by Brett Lantz

Solve real-world data problems with R and machine learningKey FeaturesThird edition of the bestselling, widely acclaimed R machine learning book, updated and improved for R 3.6 and beyondHarness the power of R to build flexible, effective, and transparent machine learning modelsLearn quickly with a clear, hands-on guide by experienced machine learning teacher and practitioner, Brett LantzBook DescriptionMachine learning, at its core, is concerned with transforming data into actionable knowledge. R offers a powerful set of machine learning methods to quickly and easily gain insight from your data.Machine Learning with R, Third Edition provides a hands-on, readable guide to applying machine learning to real-world problems. Whether you are an experienced R user or new to the language, Brett Lantz teaches you everything you need to uncover key insights, make new predictions, and visualize your findings.This new 3rd edition updates the classic R data science book to R 3.6 with newer and better libraries, advice on ethical and bias issues in machine learning, and an introduction to deep learning. Find powerful new insights in your data; discover machine learning with R.What you will learnDiscover the origins of machine learning and how exactly a computer learns by examplePrepare your data for machine learning work with the R programming languageClassify important outcomes using nearest neighbor and Bayesian methodsPredict future events using decision trees, rules, and support vector machinesForecast numeric data and estimate financial values using regression methodsModel complex processes with artificial neural networks — the basis of deep learningAvoid bias in machine learning modelsEvaluate your models and improve their performanceConnect R to SQL databases and emerging big data technologies such as Spark, H2O, and TensorFlowWho this book is forData scientists, students, and other practitioners who want a clear, accessible guide to machine learning with R.

Internet of Nano-Things and Wireless Body Area Networks (WBAN)

by Fadi Al-Turjman

The Internet of Nano-Things (IoNT) is a system of nano-connected devices, objects, or organisms that have unique identifiers to transfer data over a computer or cellular network wirelessly to the Cloud. Data delivery, caching, and energy consumption are among the most significant topics in the IoNT nowadays. The book addresses data routing and energy consumption challenges and proposes nano-sensing platforms in critical Wireless Body Area Networks (WBAN). This book covers both design and implementation aspects of data delivery models and strategies in a smart application enabled by the WBAN. It focuses on smart data delivery approaches and energy savings aspects in a reliable IoNT systems.

Dropshipping: La Guida Super Semplice Su Come Realizzare un Dropshipping Formidabile

by Efron Hirsch

Il dropshipping sta diventando sempre più popolare. Infatti, oggi, molte persone entusiaste del business online lo considerano un approccio semplice e redditizio. Se il dropshipping ti incuriosisce, e il tuo interesse nell’avviare un fiorente business con il dropshipping è ai massimi storici, questo libro ti si rivelerà piuttosto utile. Pensato per essere una guida completa al dropshipping, questo libro ti aiuterà a comprendere la natura del dropshipping e i suoi benefici come modello commerciale di guadagno; questo testo di fornirà tutte le linee guida, semplici da seguire, di cui hai bisogno per avviare il tuo impero di dropshipping. Seguendo le tecniche, i suggerimenti e i trucchi evidenziati in questo libro, non solo sarai in grado di guadagnare i tuoi primi profitti con il dropshipping, ma imparerai anche come ingrandire il tuo business di dropshipping e renderlo di successo.

Domina Las Apps: Una Guía para Principiantes para Comenzar a Ganar Dinero con Apps

by Adidas Wilson

Las teconlogías de la comunicación avanzan constatemente para adaptarse a los tiempos. Las apps de mensajes son algo enorme ahora. Han superdo completamente a las redes sociales al convertirse en nuestra forma primaria de comunicación. Cuando la mayoría de los empresarios inician, les gusta leer artículos sobre "cómo arrasar con tu primer app," "contruyendo la app de mil millones de dólares" y muchos libros relcionados a este tema. Están pegados a este lado de la historia y cegados al otro. A fin de tener tu propia historia de éxito, debes descubrir por qué otras apps fallan. La dolorosa verdad es que hay más app fallidas que apps exitosas.

Marketing de Afiliados: Construa seu próprio negócio de marketing de afiliados

by Adidas Wilson

Marketing de Afiliados: Construa seu próprio negócio de marketing de afiliados enquanto viaja pelo mundo Por Adidas Wilson O marketing de afiliados é a divulgação de produtos de variados negócios como viagens, finanças, crédito, etc. feito por outras pessoas. Os profissionais de marketing publicam links com anúncios on-line em diversos sites, os afiliados promovem seus produtos e, uma vez que a venda é realizada, recebem comissões. O marketing de afiliados faz sucesso pela sua visibilidade, onde inúmeros novos clientes podem ver seus produtos e o interesse é alcançado à medida que elem veem o produto repetidas vezes. Existem duas maneiras de fazer marketing afiliado. Começando seu programa de afiliados ou tornando-se afiliado de outra empresa. A cada venda realizada por meio dos esforços de afiliados, você paga uma comissão, e se você optar por ter seu programa de afiliados, toda compra significa que você deve pagar uma comissão. Mas se caso você escolher promover o negócio de terceiros em seu site, receberá comissão em cima de cada venda que fizer. Introdução Cap. 1 – Noção de Marketing de Afiliados para Empreendedores Cap. 2 – Tendências no Marketing de Afiliados Cap. 3 – Estratégias de Marketing para Mídias Sociais Cap. 4 – As Melhores Ferramentas Wordpress Cap. 5 – Como Ganhar Dinheiro em Casa Cap. 6 – A Arte de Cultivar seu Site de Afiliados Cap. 7 – Mandamentos do Marketing de Afiliados Cap. 8 – Roteiro de Conteúdo para Marketing de Afiliados Cap. 9 – As Melhores Redes de Afiliados Cap. 10 – Os Melhores Nichos para Marketing de Afiliados Cap. 11 – Ganhe Dinheiro com Programas de Anúncios Afiliados Cap. 12 – Lançando seu Marketing de Afiliados Cap. 13 – Quatro Estratégias para Alcançar o Sucesso no Marketing de Afiliados Cap. 14 – Atrair os principais afiliados C

La bocina del hogar

by Adidas Wilson

El presente libro no da una gran ilustración del cómo podemos manejar de manera más fácil nuestro hogar de forma inteligente, la bocina del hogar, que se ha convertido en esa útil herramienta tan esencial para llevar a cabo las tareas más básicas del hogar, como encender luces, encender el radio en la estación favorita, transmitir y escuchar la misma música en dos o más habitaciones del hogar, encender y apagar los electrodomésticos en fin, se prevé que será un exito, y sobre todo porque es la pauta a seguir para mejorar las tareas automátizadas en el hogar.

Oracle High Availability, Disaster Recovery, and Cloud Services: Explore RAC, Data Guard, and Cloud Technology

by YV Ravi Kumar Nassyam Basha Krishna Kumar K M Bal Mukund Sharma Konstantin Kerekovski

Work with Oracle database’s high-availability and disaster-management technologies. This book covers all the Oracle high-availability technologies in one place and also discusses how you configure them in engineered systems and cloud services.You will see that when you say your database is healthy, it is not limited to whether the database is performing well on day-to-day operations; rather it should also be robust and free from disasters. As a result, your database will be capable of handling unforeseen incidents and recovering from disaster with very minimal or zero downtime. Oracle High Availability, Disaster Recovery, and Cloud Services explores all the high-availability features of Oracle database, how to configure them, and best practices.After you have read this book you will have mastered database high-availability concepts such as RAC, Data Guard, OEM 13c, and engineered systems (Oracle Exadata x6/x7 and Oracle Database Appliance). What You Will LearnMaster the best practices and features of Exadata and ODAImplement and monitor high availability with OEM 13cClone databases using various methods in Oracle 12c R2Work with the Oracle sharding features of Oracle 12c R2Who This Book Is ForOracle database administrators

Beginning JavaScript: The Ultimate Guide to Modern JavaScript Development

by Russ Ferguson

Discover everything you need to know to get up-to-speed with JavaScript development and add dynamic enhancements to web pages. This completely updated third edition reveals how the code works and when to use closures, constants, and execution content. <p><p> Starting with the basics, you’ll see how to employ prototypical inheritance, as well as memory management, variable hoisting and event bubbling. Also covered is an introduction to Node.js and package managers, key to understanding the tools necessary in front-end development and how they are used with current JavaScript frameworks. <p><p> JavaScript is one of the most important technologies on the web, providing the means to add dynamic functionality to your web pages and serving as the backbone of working with frameworks like Angular and React. Beginning JavaScript, Third Edition will take you from being a JavaScript novice to working freely with this important technology - begin your JavaScript journey today! What You'll LearnConstruct good JavaScript syntax following modern coding practicesUse JavaScript to communicate with the server and retrieve dataDynamically manipulate markup, validate forms and deal with imagesDebug applications using features inside the browserUse TypeScript to bring strong typing to the languageWho This Book Is For Beginner to intermediate developers with a basic knowledge of front-end programming who are looking for a deeper understanding of how JavaScript works in the browser and how to answer questions in an interview. <P><P><i>Advisory: Bookshare has learned that this book offers only partial accessibility. We have kept it in the collection because it is useful for some of our members. Benetech is actively working on projects to improve accessibility issues such as these.</i>

Cryptography with Shrinking Generators: Fundamentals and Applications of Keystream Sequence Generators Based on Irregular Decimation (SpringerBriefs in Mathematics)

by Amparo Fúster-Sabater Sara Díaz Cardell

This book offers a broad survey of all information made public - from 1993 until today - on keystream sequence generators based on irregular decimation, which are referred to as shrinking generators. Starting with an overview of cryptography, it describes each type of generator - shrinking, self-shrinking, modified self-shrinking, generalized self-shrinking and the DECIM algorithm - with examples and references. Further, the book discusses several attacks on these generators and applications. It concludes by demonstrating how the output sequences can be modeled by means of different families of one-dimensional cellular automata, rendering the generators vulnerable to attacks. Intended for researchers and graduate students, the book will hopefully inspire them to search for more details on this family of generators and to address the open problems in this field.

Financial Software Engineering (Undergraduate Topics in Computer Science)

by Kevin Lano Howard Haughton

In this textbook the authors introduce the important concepts of the financial software domain, and motivate the use of an agile software engineering approach for the development of financial software. They describe the role of software in defining financial models and in computing results from these models. Practical examples from bond pricing, yield curve estimation, share price analysis and valuation of derivative securities are given to illustrate the process of financial software engineering.Financial Software Engineering also includes a number of case studies based on typical financial engineering problems:*Internal rate of return calculation for bonds* Macaulay duration calculation for bonds* Bootstrapping of interest rates* Estimation of share price volatility* Technical analysis of share prices* Re-engineering Matlab to C#* Yield curve estimation* Derivative security pricing* Risk analysis of CDOs The book is suitable for undergraduate and postgraduate study, and for practitioners who wish to extend their knowledge of software engineering techniques for financial applications

Cybersecurity in Nigeria: A Case Study of Surveillance and Prevention of Digital Crime (SpringerBriefs in Cybersecurity)

by Aamo Iorliam

This book reviews the use of digital surveillance for detecting, investigating and interpreting fraud associated with critical cyberinfrastructures in Nigeria, as it is well known that the country’s cyberspace and cyberinfrastructures are very porous, leaving too much room for cyber-attackers to freely operate. In 2017, there were 3,500 successful cyber-attacks on Nigerian cyberspace, which led to the country losing an estimated 450 million dollars. These cybercrimes are hampering Nigeria’s digital economy, and also help to explain why many Nigerians remain skeptical about Internet marketing and online transactions. If sensitive conversations using digital devices are not well monitored, Nigeria will be vulnerable to cyber-warfare, and its digital economy, military intelligence, and related sensitive industries will also suffer. The Nigerian Army Cyber Warfare Command was established in 2018 in order to combat terrorism, banditry, and other attacks by criminal groups in Nigeria. However, there remains an urgent need to produce digital surveillance software to help law enforcement agencies in Nigeria to detect and prevent these digitally facilitated crimes. The monitoring of Nigeria’s cyberspace and cyberinfrastructure has become imperative, given that the rate of criminal activities using technology has increased tremendously. In this regard, digital surveillance includes both passive forensic investigations (where an attack has already occurred) and active forensic investigations (real-time investigations that track attackers). In addition to reviewing the latest mobile device forensics, this book covers natural laws (Benford’s Law and Zipf’s Law) for network traffic analysis, mobile forensic tools, and digital surveillance software (e.g., A-BOT). It offers valuable insights into how digital surveillance software can be used to detect and prevent digitally facilitated crimes in Nigeria, and highlights the benefits of adopting digital surveillance software in Nigeria and other countries facing the same issues.

Requirements Engineering: 25th International Working Conference, REFSQ 2019, Essen, Germany, March 18–21, 2019, Proceedings (Lecture Notes in Computer Science #11412)

by Eric Knauss Michael Goedicke

This book constitutes the proceedings of the 25th International Working Conference on Requirements Engineering - Foundation for Software Quality, REFSQ 2019, held in Essen, Germany, in March 2019. The 13 full papers and 9 short papers in this volume were carefully reviewed and selected from 66 submissions. The papers were organized in topical sections named: Automated Analysis; Making Sense of Requirements; Tracelink Quality; Requirements Management (Research Previews); From Vision to Specification; Automated Analysis (Research Previews); Requirements Monitoring; Open Source; Managing Requirements Knowledge at a Large Scale; in Situ/Walkthroughs (Research previews).

VLSI-SoC: 25th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2017, Abu Dhabi, United Arab Emirates, October 23–25, 2017, Revised and Extended Selected Papers (IFIP Advances in Information and Communication Technology #500)

by Michail Maniatakos Ibrahim Abe Elfadel Matteo Sonza Reorda H. Fatih Ugurdag José Monteiro Ricardo Reis

This book contains extended and revised versions of the best papers presented at the 25th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2017, held in Abu Dhabi, United Arab Emirates, in August 2017. The 11 papers included in this book were carefully reviewed and selected from the 33 full papers presented at the conference. The papers cover a wide range of topics in VLSI technology and advanced research. They address the latest scientific and industrial results and developments as well as future trends in the field of System-on-Chip (SoC) Design. On the occasion of the silver jubilee of the VLSI-SoC conference series the book also includes a special chapter that presents the history of the VLSI-SoC series of conferences and its relation with VLSI-SoC evolution since the early 80s up to the present.

New Trends in Aggregation Theory (Advances in Intelligent Systems and Computing #981)

by Radomír Halaš Marek Gagolewski Radko Mesiar

This book collects the contributions presented at AGOP 2019, the 10th International Summer School on Aggregation Operators, which took place in Olomouc (Czech Republic) in July 2019. It includes contributions on topics ranging from the theory and foundations of aggregation functions to their various applications. Aggregation functions have numerous applications, including, but not limited to, data fusion, statistics, image processing, and decision-making. They are usually defined as those functions that are monotone with respect to each input and that satisfy various natural boundary conditions. In particular settings, these conditions might be relaxed or otherwise customized according to the user’s needs. Noteworthy classes of aggregation functions include means, t-norms and t-conorms, uninorms and nullnorms, copulas and fuzzy integrals (e.g., the Choquet and Sugeno integrals). This book provides a valuable overview of recent research trends in this area.

Erfolgsfaktor Agilität: Warum Scrum und Kanban zu zufriedenen Mitarbeitern und erfolgreichen Kunden führen

by Janko Böhm

Mehr und mehr Unternehmen gehen dazu über, agile Organisationsstrukturen umzusetzen – oder versuchen sich daran. Ein Unternehmen von der klassischen, abteilungsorientierten Struktur zu einem agilen Unternehmen zu wandeln, erfordert nicht nur vom Geschäftsführer und den Führungskräften ein Umdenken. Auf dem Weg hin zur agilen Organisation ist dieses Buch ein wichtiges Hilfsmittel. Es zeigt die Grundlagen der beweglichen Produktentwicklung auf, erläutert Zusammenhänge und Konsequenzen. Es richtet sich dabei an:• Unternehmer und Führungskräfte, die moderne Arbeitsbedingungen schaffen wollen, um gute Mitarbeiter zu halten• Mitarbeiter, die künftig in agilen Teams arbeiten werden oder dies bereits tun, um selbstbestimmt und kreativ zu sein• Kunden, die das für die aktuelle Marktsituation passende Produkt schnell und kostengünstig wollenDurch die Erklärung der wichtigsten Fachbegriffe und Zusammenhänge erfährt der Leser, warum und wie die agile Idee in einem Unternehmen Erfolg schafft. Janko Böhm leitet den Erfolgsfaktor Agilität in seinem Buch anhand der zwei gebräuchlichsten agilen Methoden „Scrum“ und „Kanban“ her. Damit wird das Buch zum praktischen Helfer für das Team und die eigene Organisation.

Emerging Research in Computing, Information, Communication and Applications: ERCICA 2018, Volume 1 (Advances in Intelligent Systems and Computing #882)

by N. R. Shetty L. M. Patnaik H. C. Nagaraj Prasad Naik Hamsavath N. Nalini

This book presents selected papers from the International Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA 2018. The conference provided an interdisciplinary forum for researchers, professional engineers and scientists, educators, and technologists to discuss, debate and promote research and technology in the emerging areas of computing, information, communication and their applications. The book discusses these research areas, providing a valuable resource for researchers and practicing engineers alike.

Intelligent and Interactive Computing: Proceedings of IIC 2018 (Lecture Notes in Networks and Systems #67)

by Vincenzo Piuri Valentina Emilia Balas Samarjeet Borah Sharifah Sakinah Syed Ahmad

This book presents the latest research on computational approaches to learning. It includes high-quality peer-reviewed papers from the “Intelligent and Interactive Computing Conference (IIC 2018)” organized by the Universiti Teknikal Malaysia, Melaka. It uses empirical studies, theoretical analysis, and comparisons with psychological phenomena to show how learning methods can be employed to solve important application problems. The book also describes ongoing research in various research labs, universities and institutions, which may lead to the development of marketable products.

Emerging Technologies in Computer Engineering: Second International Conference, ICETCE 2019, Jaipur, India, February 1–2, 2019, Revised Selected Papers (Communications in Computer and Information Science #985)

by Arun K. Somani Seeram Ramakrishna Anil Chaudhary Chothmal Choudhary Basant Agarwal

This book constitutes the refereed proceedings of the Second International Conference on Emerging Technologies in Computer Engineering: Microservices in Big Data Analytics, ICETCE 2019, held in Jaipur, India, in February 2019. The 28 revised full papers along with 1 short paper presented were carefully reviewed and selected from 253 submissions. ICETCE conference aims to showcase advanced technologies, techniques, innovations and equipments in computer engineering. It provides a platform for researchers, scholars, experts, technicians, government officials and industry personnel from all over the world to discuss and share their valuable ideas and experiences.

Smart Technologies and Innovations in Design for Control of Technological Processes and Objects: Proceeding of the International Science and Technology Conference "FarEastСon-2018" Volume 2 (Smart Innovation, Systems and Technologies #139)

by Denis B. Solovev

This book features selected papers presented at The International Science and Technology Conference “FarEastCon”, which took place on October 2–4, 2018 in Vladivostok, Russian Federation.The conference represents an informational platform for accumulating expert opinion on projects and initiatives aimed at the implementation of farsighted scientific research and development; it also allows scientific and practical achievements to be shared with a wide circle of researchers.Sections of the conference are of interest for the broad range of experts involved in developing innovative solutions and organizing events that increase the efficiency of economic and innovative activities.

Refine Search

Showing 24,401 through 24,425 of 53,677 results