Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Design Reliability: Fundamentals and Applications
Design Reliability: Fundamentals and Applications
As engineering systems become more and more complex, industry has recognized the importance of system and product reliability and places ever increasing emphasis on it during the design phase. Despite its efforts, however, industry continues to lose billions of dollars each year because of unexpected system failures. Therefore, it becomes...
Adversarial Reasoning: Computational Approaches to Reading the Opponent's Mind
Adversarial Reasoning: Computational Approaches to Reading the Opponent's Mind
The rising tide of threats, from financial cybercrime to asymmetric military conflicts, demands greater sophistication in tools and techniques of law enforcement, commercial and domestic security professionals, and terrorism prevention. Concentrating on computational solutions to determine or anticipate an adversary's intent, Adversarial Reasoning:...
An Introduction to Cryptography, Second Edition (Discrete Mathematics and Its Applications)
An Introduction to Cryptography, Second Edition (Discrete Mathematics and Its Applications)
Continuing a bestselling tradition, An Introduction to Cryptography, Second Edition provides a solid foundation in cryptographic concepts that features all of the requisite background material on number theory and algorithmic complexity as well as a historical look at the field. With numerous additions and restructured material, this edition...
The Communications Handbook, Second Edition (Electrical Engineering Handbook)
The Communications Handbook, Second Edition (Electrical Engineering Handbook)
For more than six years, The Communications Handbook stood as the definitive, one-stop reference for the entire field. With new chapters and extensive revisions that reflect recent technological advances, the second edition is now poised to take its place on the desks of engineers, researchers, and students around the world. From fundamental...
Automated Data Analysis Using Excel
Automated Data Analysis Using Excel
Because the analysis of copious amounts of data and the preparation of custom reports often take away time from true research, the automation of these processes is paramount to ensure productivity. Exploring the core areas of automation, report generation, data acquisition, and data analysis, Automated Data Analysis Using Excel illustrates how to...
Optical Switching / Networking and Computing for Multimedia Systems (Optical Engineering)
Optical Switching / Networking and Computing for Multimedia Systems (Optical Engineering)
We have witnessed the rapid growth in the popularity of the Internet technology over the past few years. The current network technologies provide ubiquitous access to a vast amount of information on a huge variety of topics, but limited bandwidth has constrained the impact and growth of broadband multimedia applications. To allow new broadband...
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities...
Computer Network Time Synchronization: The Network Time Protocol
Computer Network Time Synchronization: The Network Time Protocol
This book is all about wrangling a herd of network computers so that all display the correct time. This may seem like a really narrow business, but the issues go far beyond winding the clock on your display taskbar. Carefully coordinated, reliable, and accurate time is vital for traffic control in the air and on the ground, buying and selling...
Scalable and Secure Internet Services and Architecture
Scalable and Secure Internet Services and Architecture
Scalable and Secure Internet Services and Architecture provides an in-depth analysis of many key scaling technologies. Topics include: server clusters and load balancing; QoS-aware resource management; server capacity planning; Web caching and prefetching; P2P overlay network; mobile code and security; and mobility support for adaptive grid...
Multimedia Systems, Standards, and Networks
Multimedia Systems, Standards, and Networks
"Describes ITU H H.323 and H.324, H.263, ITU-T video, and MPEG-4 standards, systems, and coding; IP and ATM networks; multimedia search and retrieval; image retrieval in digital laboratories; and the status and direction of MPEG-7."

We humans, being social creatures, have historically felt the need for increasingly sophisticated means...

A Java Library of Graph Algorithms and Optimization (Discrete Mathematics and Its Applications)
A Java Library of Graph Algorithms and Optimization (Discrete Mathematics and Its Applications)
Because of its portability and platform-independence, Java is the ideal computer programming language to use when working on graph algorithms and other mathematical programming problems. Collecting some of the most popular graph algorithms and optimization procedures, A Java Library of Graph Algorithms and Optimization provides the source code for...
The MAPLE Book
The MAPLE Book
Maple is a very powerful computer algebra system used by students, educators, mathematicians, statisticians, scientists, and engineers for doing numerical and symbolic computations. Greatly expanded and updated from the author's MAPLE V Primer, The MAPLE Book offers extensive coverage of the latest version of this outstanding software package,...
unlimited object storage image
Result Page: 105 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy