Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Sustainable Manufacturing: Shaping Global Value Creation (Ecoproduction)
Sustainable Manufacturing: Shaping Global Value Creation (Ecoproduction)

The annual series Global Conferences on Sustainable Manufacturing (GCSM) sponsored by the International Academy for Production Engineering (CIRP) is committed to excellence in the creation of sustainable products and processes that conserve energy and natural resources, have minimal negative impacts upon the natural environment and society,...

Designing Storage for Exchange 2007 SP1 (Digital Press Storage Technologies)
Designing Storage for Exchange 2007 SP1 (Digital Press Storage Technologies)
The more important data storage gets, the more admins need this guide to maximize Microsoft server storage performance and efficiency.

This book will help you understand the new choices and possibilities available in designing your storage environment for Microsoft Exchange Server 2007 SP1. The move of Microsoft Exchange
...
Acne For Dummies (Health & Fitness)
Acne For Dummies (Health & Fitness)
Acne is the most common skin disease in the United States, affecting more than 60 million adults and teenagers each year. Acne For Dummies addresses the causes of acne, and, most importantly, what can safely be done to cover it up, treat it, and minimize scarring. The book covers everything from daily skin care, over-the-counter acne preparations,...
Fundamentals of Air Cleaning Technology and Its Application in Cleanrooms
Fundamentals of Air Cleaning Technology and Its Application in Cleanrooms

Fundamentals of Air Cleaning Technology and Its Application in Cleanrooms sets up the theoretical framework for cleanrooms. New ideas and methods are presented, which include the characteristic index of cleanrooms, uniform and non-uniform distribution characteristics, the minimum sampling volume, a new concept of outdoor air...

Rough Computing: Theories, Technologies and Applications
Rough Computing: Theories, Technologies and Applications
Rough set theory is a new soft computing tool which deals with vagueness and uncertainty. It has attracted the attention of researchers and practitioners worldwide, and has been successfully applied to many fields such as knowledge discovery, decision support, pattern recognition, and machine learning.

Rough Computing: Theories,...

Finite Automata and Application to Cryptography
Finite Automata and Application to Cryptography
Finite Automata and Application to Cryptography mainly deals with the invertibility theory of finite automata and its application to cryptography. In addition, autonomous finite automata and Latin arrays, which are relative to the canonical form for one-key cryptosystems based on finite automata, are also discussed.

Finite automata are...

Microelectromechanical Systems: Advanced Materials and Fabrication Methods
Microelectromechanical Systems: Advanced Materials and Fabrication Methods

Microelectromenchanical systems (MEMS) is a revolutionary field that adapts for new uses a technology already optimized to accomplish a specific set of objectives. The silicon-based integrated circuits process is so highly refined it can produce millions of electrical elements on a single chip and define their critical dimensions to...

CCNP ISCW Portable Command Guide (Self-Study Guide)
CCNP ISCW Portable Command Guide (Self-Study Guide)
Welcome to ISCW! In 2006, Cisco Press contacted Scott and told him, albeit very quietly, that there was going to be a major revision of the CCNP certification exams. They then asked whether he would be interested in working on a command guide in the same fashion as his previous books for Cisco Press: the Cisco Networking Academy Program CCNA...
Behavioral Addictions: Criteria, Evidence, and Treatment
Behavioral Addictions: Criteria, Evidence, and Treatment

"Behavioral Addictions is a timely landmark achievement and a must read for anyone interested in addictive and compulsive behavior and its treatment. Rosenberg and Feder have brought us leading addiction experts, who clearly present the growing evidence for including behavioral addictions in the DSM-5 and how best to treat...

Dependability Benchmarking for Computer Systems (Practitioners)
Dependability Benchmarking for Computer Systems (Practitioners)

A comprehensive collection of benchmarks for measuring dependability in hardware-software systems

As computer systems have become more complex and mission-critical, it is imperative for systems engineers and researchers to have metrics for a system's dependability, reliability, availability, and serviceability....

Joint Source-Channel Decoding: A Cross-Layer Perspective with Applications in Video Broadcasting
Joint Source-Channel Decoding: A Cross-Layer Perspective with Applications in Video Broadcasting

Traditionally, cross-layer and joint source-channel coding were seen as incompatible with classically structured networks but recent advances in theory changed this situation. Joint source-channel decoding is now seen as a viable alternative to separate decoding of source and channel codes, if the protocol layers are taken into account. A...

Graph-Theoretic Concepts in Computer Science: 37th International Workshop, WG 2011
Graph-Theoretic Concepts in Computer Science: 37th International Workshop, WG 2011

The 37th International Workshop on Graph-Theoretic Concepts in Computer Science (WG 2011) took place in Tepl´a Monastery, Czech Republic, during June 21–24, 2011. It was attended by 80 participants who came from all over the world not only to deliver or listen to interesting talks, but also to celebrate the 65th birthday of Ludek...

unlimited object storage image
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy