Navigation bar
  Start Previous page
 67 of 106 
Next page End 62 63 64 65 66 67 68 69 70 71 72  

Addison-Wesley Professional | ISBN 0321228758 | 2004 Year | CHM | 3,98 Mb | 656
Pages
“ There shouldn't be any doubt in anybody's mind that there's a lot of software
around, with more being developed every day. Some software is being developed
just for fun. For some people developing software is a hobby. Some software is
being developed for education: People are studying to be professional
programmers, analysts, project managers, and so on, and they need to develop
software as part of their education. Some even say that their software is
artistic. But let's face it, the vast majority of the software on the planet was
created for a purpose: a business purpose. To put it bluntly, the software is
there so that somebody can make money.
And even though making money was the software's intended purpose, you'll see in
Chapter 1 that software doesn't always live up to that purpose. A lot of
software has been written that probably shouldn't have been written in the first
place. And a lot of good technology has been put into building the right
software, but building it the wrong way so the software ends up never achieving
its business goals. Software projects can easily end up costing more money than
the resulting product ever brings back in. Financially, many organizations would
have been better off never starting some software projects.
Password: www.AvaxHome.ru
Joseph A. Massad, "Colonial Effects. The Making of National Identity in Jordan"
Columbia University Press | ISBN 0231123221 | 2001 Year | PDF | 1,37 Mb | 276
Pages
“ This book analyzes how modern Jordanian identity was created and defined.
Massad studies two key institutions, the law and the military, and uses them to
create an original and precise analysis of the development of Jordanian national
identity in the postcolonial period.
The author engages recent scholarly debates on nationalism and richly fulfills
the analytical promise of Michel Foucault's insight that modern institutions of
power have productive, not merely repressive or coercive, capacities - though
Massad also stresses their continued repressive function.
The argument is advanced by a consideration of evidence, including images
produced by state tourist agencies aimed at attracting Western visitors, the
changing and precarious position of women in the newly constructed national
space, and such practices as soccer games, music, songs, food, clothing, and
shifting accents and dialects.
Password: www.AvaxHome.ru
David J. Hand, Heikki Mannila, Padhraic Smyth, "Principles of Data Mining"
The MIT Press | ISBN 026208290X | 2001 Year | DjVu | 4,79 Mb | 425 Pages
“ This book is not an introductory text. Anyone interested in a particular topic
should consult the preface of the text to find out what it is about. The
negative reviewers were not fair to the authors on that score. Had they read the
preface they would have found out (1) how the authors define data mining, (2)
that they see it as a subject with an important mix of statistical methodology
and computer science and (3) that it is intended as an advanced undergraduate or
first year graduate text on the topic.
They also provide a very well organized structure for the text that is well
described in the preface. It consists of three parts. Chapter 1 is an essential
introduction that is informative to everyone. Chapters 2 through 4 go through
basic statistical ideas that statisticians would be very familiar with and
others could view as a refresher. The authors have experience teaching this
course to engineering and science majors and have found that many of these
students unfortunately do not have the prerequisite statistical inference ideas
and need this material covered in the course.
Chapters 5 through 8 cover the components of data mining algorithms and the
remaining chapters deal with the details of the tasks and algorithms.
The book features a further reading section at the end of each chapter that
provides a very nice guide to the useful and most significant relevant
literature. The author's have done a very good job at this. One mistake I found
was a reference to Miller (1980). I think this was intended to be a reference to
the seocnd edition fo Rupert Miller's text "Simultaneous Statistical Inference"
which was published in 1981 by Springer-Verlag but the full citation is missing
from the list of references in the back of the book.
This book deserves 5 stars because it does what it intends to do. It presents
the field of data mining in a clear way covering topics on classfication and
kernel methods expertly. David Hand has published a great deal on these
techniques including many fine books.
Mannila and Smyth bring to the text the computer science perspective. There is
much useful material on optimization methods and computational complexity.
Statistical modeling and issues of the "curse of dimensionality" and the
"overfitting problem" are key issues that this text emphasizes and expertly
addresses.
The only thing the text misses is details on specific algorithms. But I do not
grade them down for that because it was not their intention. They emphasize
methodology and issues and that is the most critical thing a practitioner needs
to know first before embarking on his own attack at mining data.
The text does provide most of the current important methods. Although Vapnik's
work is mentioned and his two books are referenced there is very little
discussion of support vector machines and the use of Vapnik-Chervonenkis classes
and dimension
in data mining. The new book by Hastie, Tibshirani and Friedman goes into much
greater detail on specific algorithms include some only briefly discussed in
this text (e.g. support vector machines). The support vector approach is also
nicely treated in "Learning with Kernels" by Scholkopf and Smola.
I highly recommend this book for anyone interested in data mining. It is a great
reference source and an eloquent text to remind you of the pitfalls of
thoughtless mining or "data-dredging". It also has many nice practical examples
and some interesting success stories on the application of data mining to
specific problems.
Password: www.AvaxHome.ru
Herb Sutter, Andrei Alexandrescu, "C++ Coding Standards: 101 Rules, Guidelines,
and Best Practices"
Addison-Wesley Professional | ISBN 0321113586 | 2004 Year | CHM | 0,52 Mb | 240
Pages
“ Good coding standards can offer many interrelated advantages:
Improved code quality: Encouraging developers to do the right things in a
consistent way directly works to improve software quality and maintainability.
Improved development speed: Developers don't need to always make decisions
starting from first principles.
Better teamwork: They help reduce needless debates on inconsequential issues and
make it easier for teammates to read and maintain each other's code.
Uniformity in the right dimension: This frees developers to be creative in
directions that matter.
Under stress and time pressure, people do what they've been trained to do. They
fall back on habit. That's why ER units in hospitals employ experienced, trained
personnel; even knowledgeable beginners would panic.
As software developers, we routinely face enormous pressure to deliver
tomorrow's software yesterday. Under schedule pressure, we do what we are
trained to do and are used to doing. Sloppy programmers who in normal times
don't know good practices of software engineering (or aren't used to applying
them) will write even sloppier and buggier code when pressure is on. Conversely,
programmers who form good habits and practice them regularly will keep
themselves organized and deliver quality code, fast.
The coding standards introduced by this book are a collection of guidelines for
writing high-quality C++ code. They are the distilled conclusions of a rich
collective experience of the C++ community. Much of this body of knowledge has
only been available in bits and pieces spread throughout books, or as word-of-
mouth wisdom. This book's intent is to collect that knowledge into a collection
of rules that is terse, justified, and easy to understand and follow.
Of course, one can write bad code even with the best coding standards. The same
is true of any language, process, or methodology. A good set of coding standards
fosters good habits and discipline that transcend mere rules. That foundation,
once acquired, opens the door to higher levels. There's no shortcut; you have to
develop vocabulary and grammar before writing poetry. We just hope to make that
easier.
We address this book to C++ programmers of all levels:
If you are an apprentice programmer, we hope you will find the rules and their
rationale helpful in understanding what styles and idioms C++ supports most
naturally. We provide a concise rationale and discussion for each rule and
guideline to encourage you to rely on understanding, not just rote memorization.
For the intermediate or advanced programmer, we have worked hard to provide a
detailed list of precise references for each rule. This way, you can do further
research into the rule's roots in C++'s type system, grammar, and object model.
At any rate, it is very likely that you work in a team on a complex project.
Here is where coding standards really pay off-you can use them to bring the team
to a common level and provide a basis for code reviews.
Password: www.AvaxHome.ru
Alan S. Kaufman, Elizabeth O. Lichtenberger, "Assessing Adolescent and Adult
Intelligence" (3rd Edition)
Wiley | ISBN 0471735531 | 2005 Year | PDF | 12,42 Mb | 816 Pages
Previous page Top Next page