Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Computer Engineering Handbook (Electrical Engineering Handbook)
The Computer Engineering Handbook (Electrical Engineering Handbook)

There is arguably no field in greater need of a comprehensive handbook than computer engineering. Under the leadership of Vojin Oklobdzija and a stellar editorial board, some of the industry's foremost experts have joined forces to create what promises to be the definitive resource for computer design and engineering. Instead of focusing on...

ATM Technology for Broadband Telecommunications Networks
ATM Technology for Broadband Telecommunications Networks
This textbook presents all the latest information on all aspects of each important component of ATM - the hottest telecommunications technology of this decade. It demonstrates how ATM internetworks several incompatible telecommunications technologies and provide the high-speed, high bandwidth backbone network that the entire telecom industry is...
Image Processing: Tensor Transform and Discrete Tomography with MATLAB ®
Image Processing: Tensor Transform and Discrete Tomography with MATLAB ®

Focusing on mathematical methods in computer tomography, Image Processing: Tensor Transform and Discrete Tomography with MATLAB® introduces novel approaches to help in solving the problem of image reconstruction on the Cartesian lattice. Specifically, it discusses methods of image processing along...

Joint Cognitive Systems: Patterns in Cognitive Systems Engineering
Joint Cognitive Systems: Patterns in Cognitive Systems Engineering
Our fascination with new technologies is based on the assumption that more powerful automation will overcome human limitations and make our systems 'faster, better, cheaper,' resulting in simple, easy tasks for people. But how does new technology and more powerful automation change our work? Research in Cognitive Systems Engineering (CSE) looks at...
Design Reliability: Fundamentals and Applications
Design Reliability: Fundamentals and Applications
As engineering systems become more and more complex, industry has recognized the importance of system and product reliability and places ever increasing emphasis on it during the design phase. Despite its efforts, however, industry continues to lose billions of dollars each year because of unexpected system failures. Therefore, it becomes...
Adversarial Reasoning: Computational Approaches to Reading the Opponent's Mind
Adversarial Reasoning: Computational Approaches to Reading the Opponent's Mind
The rising tide of threats, from financial cybercrime to asymmetric military conflicts, demands greater sophistication in tools and techniques of law enforcement, commercial and domestic security professionals, and terrorism prevention. Concentrating on computational solutions to determine or anticipate an adversary's intent, Adversarial Reasoning:...
An Introduction to Cryptography, Second Edition (Discrete Mathematics and Its Applications)
An Introduction to Cryptography, Second Edition (Discrete Mathematics and Its Applications)
Continuing a bestselling tradition, An Introduction to Cryptography, Second Edition provides a solid foundation in cryptographic concepts that features all of the requisite background material on number theory and algorithmic complexity as well as a historical look at the field. With numerous additions and restructured material, this edition...
Automated Data Analysis Using Excel
Automated Data Analysis Using Excel
Because the analysis of copious amounts of data and the preparation of custom reports often take away time from true research, the automation of these processes is paramount to ensure productivity. Exploring the core areas of automation, report generation, data acquisition, and data analysis, Automated Data Analysis Using Excel illustrates how to...
Optical Switching / Networking and Computing for Multimedia Systems (Optical Engineering)
Optical Switching / Networking and Computing for Multimedia Systems (Optical Engineering)
We have witnessed the rapid growth in the popularity of the Internet technology over the past few years. The current network technologies provide ubiquitous access to a vast amount of information on a huge variety of topics, but limited bandwidth has constrained the impact and growth of broadband multimedia applications. To allow new broadband...
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities...
Computer Network Time Synchronization: The Network Time Protocol
Computer Network Time Synchronization: The Network Time Protocol
This book is all about wrangling a herd of network computers so that all display the correct time. This may seem like a really narrow business, but the issues go far beyond winding the clock on your display taskbar. Carefully coordinated, reliable, and accurate time is vital for traffic control in the air and on the ground, buying and selling...
Scalable and Secure Internet Services and Architecture
Scalable and Secure Internet Services and Architecture
Scalable and Secure Internet Services and Architecture provides an in-depth analysis of many key scaling technologies. Topics include: server clusters and load balancing; QoS-aware resource management; server capacity planning; Web caching and prefetching; P2P overlay network; mobile code and security; and mobility support for adaptive grid...
Result Page: 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy