Author | Wang TianyiSOURCE | Geek Time column "Artificial Intelligence Basic Course"Doctor of Engineering, associate professor of AI Collection book, with the text attached to the PDF version of the link.Machine Learning ChapterIn machine learning, the first recommendation is the work of two domestic authors: "Statistical learning methods" by Dr. Hangyuan Li and "machine learning" by Professor Zhou Zhihua."Statistical learning Method" adopts "total-di
The csdn reading channel has been running for more than three months. It has been working with the Computer and Information Agency of Tsinghua University Press, Wenkang, wenyuan, jindi, Electronic Industry Press, Bowen, feisi, and today's electronics, many well-known publishers and publishing companies, such as the People's post and telecommunications publishing house computer
Recommended for Android development books: From Getting started to mastering the series Learning Route book IntroductionTransferred from: http://blog.csdn.net/findsafety/article/details/52317506Many times we will continue to receive questions from beginners, "What are the classic introductory materials and learning routes for Android?" "," What are the recommendations for the Android Development starter tutorial? "And so on, we repeatedly answer these
Three years ago, I was lucky enough to cooperate with Chen Yicheng (originally called Chen ice, who was planning and editing by Tsinghua University Press) to complete the creation and publishing of "big talk design model. It should be said that without the help of Chen Yucheng, it is impossible to succeed in the big talk design model. Thank you very much!
Coincidentally, when my new book was about to be published, Chen Yucheng's new
Many times, when we use the mobile phone, we accidentally delete the phone address book. So, how to restore the phone address Book? Today, small knitting to teach you to use Tencent computer Butler to restore the phone address book method. Hope to be helpful to everyone.
Double-click to open the
Computer Book list· Basis:"In- depth understanding of computer systems", the corresponding English version is "computer systems:a Programmer ' s Perspective"· Language:"Effective C + +", "more effective C + +""C expert Programming""Thinking in Java"· Android System:"In-depth understanding of the Android system", Deng o
After upgrading the computer housekeeper in the computer, we open the "Computer Butler" and then click the "Toolbox" and then open the entry.
Then click "Apply Treasure" in the Open Computer Butler interface and enter the details below ( Note that the phone is already connected to the
There are too many books on computers. Here I will list some good books I have read and never read. Add your own simple comments.
I think any entry book can be used. However, if you want to become a master, classic books will improve the realm.
Only English letters are given.
C/C ++
The C Programming LanguageK R
The examples are quite classic, no matter from the programming style to the quality of the examples, to be honest, I hate programming b
The text of the book quickly into the computer graphics and text tutorial
Tool Preparation:
Hardware: Computer A digital camera
Software: word2003 (other version I did not experiment)
doPDF
Ajviewer Software
Quick text entry steps:
1, install doPDF and ajviewer in the computer
2, with a digital camera to the ne
Through the network cable and Fly Pigeon book software, the realization of 2 computer fast transfer files, is no need to use any network, small series has just learned to be impatient to tell you, 2 computer direct transmission data, and speed super fast.
1: A network cable at both ends of the connection to the 2 comp
Http://book.douban.com/subject/1230413/
Another: http://book.douban.com/review/5627139/
Chapter 1A tour of Computer SystemA Brief Introduction to computer systems.Exam★★★: There may be some overall conceptual questions in the written test.Cultivation★: The most basic concept of a computer.-----------------------------
Some of the books on algorithms are very rigorous, but not comprehensive, others involve a lot of subject matter, but lack rigor. The introduction of the Algorithm (the 3rd edition of the original book)/Computer science series combines rigor and comprehensiveness into an in-depth discussion of various algorithms and focuses on the design and analysis of these alg
Exception Control FlowDefinition: The response of modern operating systems to abrupt changes in control flowFull name: Exception Control FlowAbbreviation: ECFEach layer form:1. Hardware layer: Hardware detected events will trigger control abrupt transfer to exception handler;2. Operating system layer: at the operating system level, the kernel transfers control from one user process to another through context translation;3. Application layer: One process can signal to another process, and the rec
1, install doPDF and ajviewer in the computer
2, with a digital camera to the need to film the text (camera and image level is not much to talk about.) The better the photo effect, the greater the error rate of the converted text can be greatly reduced.
For example:
3, in Word inserted in your digital camera on the book text (open word--Insert menu--Pictures--from the file--select photos-Inse
Tool Preparation:
Hardware: Computer A digital camera
Software: word2003 (other version I did not experiment)
doPDF
Ajviewer Software
Steps:
1, install doPDF and ajviewer in the computer
2, with a digital camera to the need to film the text (camera and image level is not much to talk about.) The better the photo effect, the greater the error rate of the converted text can be greatly reduced.
For exa
the functional features of the scholarly gathering of the computer edition :
1. Integrated Cloud Library platform. Cloud Library: Set download, search, reading, management, sharing and many other functions as one of the service platform.
2. Self-paced display, each chapter read how much at a glance (also can be cleared by one click). And with a powerful bookmark management function, save multiple bookmarks, record more exciting.
3. Multi-theme st
By Andrew Koenig, translated by Gao Wei, reviewed by Wang Xin
C traps and pitfalls
Andrew Koenig and C ++
Absolute classic
1. Greedy method in lexical analysis: each symbol should contain as many characters as possible
2. If the first character of an integer constant is 0, it is regarded as an octal value. 0100 = 64, not binary
3. printf ("Hello \ n"); with Char Hello [] = {'h', 'E', 'l', 'l', 'O ', '\ n', 0}; printf (Hello); equivalent
4. function pointer int (* FP) (); can be abbreviate
1, download dopdf and Cajviewer, these two software.
2, with a digital camera or mobile phone to take the words needed to shoot down.
3, in Word inserted in your digital camera on the book text (open word--Insert menu--Pictures--from the file--select photos-Insert)
4. Select File menu in Word--print--select dopdf--in Printer Options--click the "Browse" option--Select the location where the file is saved and fill in the name of the file--save
A new category of Reading Notes is added. You can write more reading notes later. Because I really think that my technology is too poor to write well.
Article .
Application of UML and pattern (1)-Introduction to books
Applying UML and patterns (Craig larman) 2006-1 China Machine Press (English Version 3)
This is a book on the use of UML for software modeling. for large-scale software development, t
Although this book has many
ArticleSome people have recommended this, but I still want to like it, because this is my own
. This book is written by John E. hopcroft, Rajeev motwani, Jeffrey D. Ullman.
Introduction to automata theory, ages, and computation. When I first read this book
He thinks that the basic method
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.