- Home
- Technology & Engineering
- Electrical
- Computational Intelligence Techniques and Their Applications to Software Engineering Problems
Computational Intelligence Techniques and Their Applications to Software Engineering Problems
List Price:
$65.99
- Availability: Confirm prior to ordering
- Branding: minimum 50 pieces (add’l costs below)
- Check Freight Rates (branded products only)
Branding Options (v), Availability & Lead Times
- 1-Color Imprint: $2.00 ea.
- Promo-Page Insert: $2.50 ea. (full-color printed, single-sided page)
- Belly-Band Wrap: $2.50 ea. (full-color printed)
- Set-Up Charge: $45 per decoration
- Availability: Product availability changes daily, so please confirm your quantity is available prior to placing an order.
- Branded Products: allow 10 business days from proof approval for production. Branding options may be limited or unavailable based on product design or cover artwork.
- Unbranded Products: allow 3-5 business days for shipping. All Unbranded items receive FREE ground shipping in the US. Inquire for international shipping.
- RETURNS/CANCELLATIONS: All orders, branded or unbranded, are NON-CANCELLABLE and NON-RETURNABLE once a purchase order has been received.
Product Details
Author:
Ankita Bansal, Abha Jain, Sarika Jain, Vishal Jain, Ankur Choudhary
Format:
Paperback
Pages:
265
Publisher:
CRC Press (October 4, 2024)
Language:
English
Audience:
Professional and scholarly
ISBN-13:
9780367529802
Dimensions:
6.125" x 9.1875"
File:
TAYLORFRANCIS-TayFran_260405043033412-20260405.xml
Folder:
TAYLORFRANCIS
List Price:
$65.99
Country of Origin:
United States
Pub Discount:
30
Series:
Computational Intelligence Techniques
As low as:
$62.69
Publisher Identifier:
P-CRC
Discount Code:
H
Weight:
16.25oz
Case Pack:
1
Imprint:
CRC Press
Overview
This book focusses on computational intelligence approaches as applicable in varied areas of software engineering such as software requirement prioritization, cost estimation, reliability assessment, defect prediction, maintainability and quality prediction, size estimation, vulnerability prediction, test case selection, and so forth.








