free hit counter

Neural Network Methods in Natural Language Processing

61BVinCE-CL.jpg

Neural networks are a family of powerful machine learning models. This book focuses on the application of neural network models to natural language data. The first half of the book (Parts I and II) covers the basics of supervised...

Dynamic Reconfigurable Network-on-Chip Design: Innovations for Computational Pro…

51riCIug5LL.jpg

Reconfigurable computing brings immense flexibility to on-chip processing while network-on-chip has improved flexibility in on-chip communication. Integrating these two areas of research reaps the benefits of both and represents the promising future of multiprocessor systems-on-chip. Dynamic Reconfigurable Network-on-Chip Design:...

Model Order Reduction: Theory, Research Aspects and Applications (Mathematics in…

410WzGLYDAL.jpg

The idea for this book originated during the workshop “Model order reduction, coupled problems and optimization” held at the Lorentz Center in Leiden from S- tember 19–23, 2005. During one of the discussion sessions, it became clear that a...

The Functional Approach to Data Management: Modeling, Analyzing and Integrating …

41KbAEHAeUL.jpg

It is over 20 years since the functional data model and functional programming languages were first introduced to the computing community. Although developed by separate research communities, recent work, presented in this book, suggests there is powerful synergy in...

Natural Language Processing with Python: Analyzing Text with the Natural Languag…

51ezTmJ6XFL.jpg

This book offers a highly accessible introduction to natural language processing, the field that supports a variety of language technologies, from predictive text and email filtering to automatic summarization and translation. With it, you’ll learn how to write Python...

Continuous Authentication Using Biometrics: Data, Models, and Metrics

51FdNIi4tRL.jpg

User authentication is the process of verifying whether the identity of a user is genuine prior to granting him or her access to resources or services in a secured environment. Traditionally, user authentication is performed statically at the point...

Deep Thinking: Where Machine Intelligence Ends and Human Creativity Begins

51n1FkQ6CL.jpg

“A highly human exploration of artificial intelligence, its exciting possibilities and inherent limits.” –Max Levchin, cofounder of PayPal, CEO of Affirm, and Silicon Valley angel investor Garry Kasparov’s 1997 chess match against the IBM supercomputer Deep Blue was a...

Approaches to Legal Ontologies: Theories, Domains, Methodologies (Law, Governanc…

416AIXEbH1L.jpg

The book provides the reader with a unique source regarding the current theoretical landscape in legal ontology engineering as well as on foreseeable future trends for the definition of conceptual structures to enhance the automatic processing and retrieval of...

Pedestrian and Evacuation Dynamics 2012

51mn74oLSDL.jpg

The 6th International Conference on Pedestrian and Evacuation Dynamics (PED2012) showcased research on human locomotion. This book presents the proceedings of PED2012. Humans have walked for eons; our drive to settle the globe began with a walk out of...

Advances in Computers, Volume 99

41r4J4T8LL.jpg

Advances in Computers carries on a tradition of excellence, presenting detailed coverage of innovations in computer hardware, software, theory, design, and applications. The book provides contributors with a medium in which they can explore their subjects in greater depth...