Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Resource Allocation in Multiuser Multicarrier Wireless Systems
Resource Allocation in Multiuser Multicarrier Wireless Systems
Many algorithms have already been proposed in the past to solve the problem of allocating resources in a multi-user multicarrier wireless system. Due to the difficulty of the problem, most of the previous work in this area has focused on developing suboptimal heuristics without performance guarantees.

Resource Allocation in Multiuser...

Fundamentals of the New Artificial Intelligence: Neural, Evolutionary, Fuzzy and More (Texts in Computer Science)
Fundamentals of the New Artificial Intelligence: Neural, Evolutionary, Fuzzy and More (Texts in Computer Science)
This book was originally titled “Fundamentals of the New Artificial Intelligence: Beyond Traditional Paradigms.” I have changed the subtitle to better represent the contents of the book. The basic philosophy of the original version has been kept in the new edition. That is, the book covers the most essential and widely employed material...
Web Development with Java: Using Hibernate, JSPs and Servlets
Web Development with Java: Using Hibernate, JSPs and Servlets
I have been teaching web development for ten years. I started with Perl. I can still remember the behemoth programs that contained all the logic and HTML. I remember using a text editor to write the program. Debugging consisted of a lot of print statements. It was a fun time, full of exploration, but I do not miss them.

Five years ago, I
...
Interactive Curve Modeling: with Applications to Computer Graphics, Vision and Image Processing
Interactive Curve Modeling: with Applications to Computer Graphics, Vision and Image Processing

Interactive curve modeling techniques and their applications are extremely useful in a number of academic and industrial settings, and specifically play a significant role in multidisciplinary problem solving, such as in font design, designing objects, CAD/CAM, medical operations, scientific data visualization, virtual reality, character...

Variable-length Codes for Data Compression
Variable-length Codes for Data Compression
Most data compression methods that are based on variable-length codes employ the Huffman or Golomb codes. However, there are a large number of less-known codes that have useful properties - such as those containing certain bit patterns, or those that are robust - and these can be useful. This book brings this large set of codes to the attention of...
Graph Theory (Graduate Texts in Mathematics)
Graph Theory (Graduate Texts in Mathematics)
and guided mainly by the Four-Colour Conjecture. The resolution of the conjecture by K. Appel and W. Haken in 1976, the year in which our first book Graph Theory with Applications appeared, marked a turning point in its history. Since then, the subject has experienced explosive growth, due in large measure to its role as an essential structure...
Distributed Search by Constrained Agents: Algorithms, Performance, Communication
Distributed Search by Constrained Agents: Algorithms, Performance, Communication
Agent technology is evolving as a leading field of research connected to diverse areas such as A.I., E-commerce, robotics and information retrieval. Agents systems use reasoning and constraint-based reasoning that has a wide potential for representing multiple types of problems. A fundamental building block within all these areas is the ability to...
Network Performance Analysis: Using the J Programming Language
Network Performance Analysis: Using the J Programming Language
The J programming laguage is rich in mathematical functionality and ideally suited to analytical computing methods. It is, however, a somewhat terse language and not entirely intuitive at first, particularly if one is used to more conventional programming languages such as C, Pascal or Java. J functions (called verbs) are denoted by punctuation...
Empirical Methods and Studies in Software Engineering: Experiences from ESERNET
Empirical Methods and Studies in Software Engineering: Experiences from ESERNET
Nowadays, societies crucially depend on high-quality software for a large part of their functionalities and activities. Therefore, software professionals, researchers, managers, and practitioners alike have to competently decide what software technologies and products to choose for which purpose.

For various reasons, systematic empirical...

Requirements Management: The Interface Between Requirements Development and All Other Systems Engineering Processes
Requirements Management: The Interface Between Requirements Development and All Other Systems Engineering Processes
Requirements Management has proven itself to be an enormous potential for the optimisation of development projects throughout the last few years. Especially in the climate of an increasingly competitive market

Requirements Management helps in carrying out developments faster, cheaper and with a higher quality.

This book focusses on...

Access Control Systems: Security, Identity Management and Trust Models
Access Control Systems: Security, Identity Management and Trust Models
Secure identification of users, programming agents, hosts, and networking devices is considered the core element of computing security. Rarely is anonymity a desired goal of systems, networks, and applications. This aspect is dictated largely by the extent in which computing has evolved to automate many facets of critical human activities, such as...
Advances in Biometrics: Sensors, Algorithms and Systems
Advances in Biometrics: Sensors, Algorithms and Systems

Biometrics technology continues to stride forward with its wider acceptance and its real need in various new security facets of modern society. From simply logging on to a laptop to crossing the border of a country, biometrics is being called upon to meet the growing challenges of identity management.

With contributions from academia and...

Result Page: 381 380 379 378 377 376 375 374 373 372 371 370 369 368 367 366 365 364 363 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy