Flylib.com
Building Intelligent .NET Applications(c) Agents, Data Mining, Rule-Based Systems, and Speech Processing
Building Intelligent .NET Applications(c) Agents, Data Mining, Rule-Based Systems, and Speech Processing
ISBN: N/A
EAN: N/A
Year: 2005
Pages: 123
BUY ON AMAZON
Building Intelligent .NET Applications: Agents, Data Mining, Rule-Based Systems, and Speech Processing
Table of Contents
Copyright
Praise for Building Intelligent .NET Applications
Foreword
Preface
Who Is This Book For?
What You Should Know
A Note about Security
Why I Wrote This Book
Sample Applications
Why Just Microsoft Technologies?
Acknowledgments
About the Author
Chapter 1. Introduction
The AI Effect
Enhanced Computing
Seamless Computing
Why Should You Consider Enhanced Computing?
Why Use Visual Studio .NET?
How This Book is Organized
What You Need
Chapter 2. Creating Applications That Talk
The Microsoft Speech Application SDK (SASDK)
Business Benefits of Speech
How the Speech Engine Works
Installing the SASDK
Creating a Speech Application
Debugging and Tuning a Speech Application
Setting Up a Telephony Server
Summary
Chapter 3. Telephony Applications
Creating a Speech Application to Solve a Business Problem
Loading the Sales Scheduling Database
Building a Telephony Application
Tuning User Prompts
Summary
Chapter 4. Multimodal Speech Applications
Why Create Multimodal Applications?
Sunrise Community College
Building a Multimodal Application
The Manifest File
Running the Application on PocketPC
Application Tuning
Summary
Chapter 5. Data-Mining Predictions
Introducing Data Mining with SQL Server
Savings Mart
Working with Mining Models
Summary
Chapter 6. Applying Data-Mining Predictions
Working with the Sample Application
Generating New Shipment Schedules
Measuring the Success of the New Shipment Method
Closed Loop Processing
Summary
Chapter 7. An Evolving Database
Understanding Rule-based Systems
Zoom Lending
Building a Rule-based Application
Summary
Chapter 8. Building an Agent
Understanding Agents
Building a Multiple Agent Solution
Summary
Chapter 9. The Future of Enhanced Computing
The Next Development Platform
Microsoft Research (MSR)
What About AI?
Other Areas of AI
Opportunities for Developers
Glossary
A
B
C
D
E
F
G
H
I
J
L
M
N
O
P
R
S
T
W
X
Y
Bibliography
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_Q
index_R
index_S
index_T
index_U
index_V
index_W
index_X
index_Y
index_Z
Building Intelligent .NET Applications(c) Agents, Data Mining, Rule-Based Systems, and Speech Processing
ISBN: N/A
EAN: N/A
Year: 2005
Pages: 123
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Who Are the Attackers?
What Do Attackers Do?
Reducing the Risk of an Attack
Introducing the Assessment Process
Level I Assessments
Competency-Based Human Resource Management
Competency-Based Employee Rewards
The Transformation to Competency-Based HR Management
Competency-Based HR Management The Next Steps
Appendix B Further Suggestions on Employee Development
Appendix D Employee Development and Succession Management
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Computers as Persuasive Tools
Computers as Persuasive Media Simulation
Computers as Persuasive Social Actors
Increasing Persuasion through Mobility and Connectivity
Captology Looking Forward
Microsoft WSH and VBScript Programming for the Absolute Beginner
Constants, Variables, and Arrays
Conditional Logic
Appendix A WSH Administrative Scripting
Appendix B Built-In VBScript Functions
Appendix C Whats on the CD-ROM?
802.11 Wireless Networks: The Definitive Guide, Second Edition
11 Network Operations
Cryptographic Background to WEP
Contention-Free Access Using the PCF
Selecting Access Points
Improving Performance
User Interfaces in C#: Windows Forms and Custom Controls
Forms
Modern Controls
Dynamic User Interface
GDI+ Controls
Help and Application-Embedded Support
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies