Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Understanding Petri Nets: Modeling Techniques, Analysis Methods, Case Studies
Understanding Petri Nets: Modeling Techniques, Analysis Methods, Case Studies

With their intuitive graphical approach and expressive analysis techniques, Petri nets are suitable for a wide range of applications and teaching scenarios, and they have gained wide acceptance as a modeling technique in areas such as software design and control engineering. The core theoretical principles have been studied for many decades...

Dynamic Taxonomies and Faceted Search: Theory, Practice, and Experience (The Information Retrieval Series)
Dynamic Taxonomies and Faceted Search: Theory, Practice, and Experience (The Information Retrieval Series)

Current search paradigms for the Web, direct access through search engines and navigational access via static taxonomies, have recently been strongly criticized. A third paradigm, dynamic taxonomies or faceted search, is gaining acceptance to the extent that it is now the de facto standard in product selection for e-commerce. This new...

Real-Time 3D Interventional Echocardiography
Real-Time 3D Interventional Echocardiography

​Advances in technology and human skill have made possible percutaneous catheter-based procedures for a wide spectrum of structural heart disease. A growing number of structural heart diseases that over the past two decades would have required open heart surgery can be safely treated using percutaneous catheter-based...

Building the SharePoint User Experience (Expert's Voice in Sharepoint)
Building the SharePoint User Experience (Expert's Voice in Sharepoint)

The SharePoint user experience is critical in application architecture and user acceptance. Using tools available to all developers, you will learn how to rebuild a SharePoint site, taking it all the way from the default out–of–the–box experience to your very own customized user experience.

Along the way you will...

Pump Handbook: Third Edition
Pump Handbook: Third Edition

It is difficult to follow in the footsteps of Igor J. Karassik, whose vision and leadership played a major role in the concept of a handbook on pumps that is broad enough to encompass all aspects of the subject—from the theory of operation through design and application to the multitude of tasks for which pumps of all types and sizes...

Cryptographic Hardware and Embedded Systems - CHES 2009: 11th International Workshop Lausanne
Cryptographic Hardware and Embedded Systems - CHES 2009: 11th International Workshop Lausanne

CHES 2009, the 11th workshop on Cryptographic Hardware and Embedded Systems, was held in Lausanne, Switzerland, September 6–9, 2009. The workshop was sponsored by the International Association for Cryptologic Research (IACR).

The workshop attracted a record number of 148 submissions from 29 countries, of which the...

Information Resources Management: Global Challenges
Information Resources Management: Global Challenges
The recent surge of technology outsourcing has intensified the cross-cultural effects of information systems designs and constructions, as well as the potential shortage of suitable information specialists at strategic locations. Millions of dollars of investments in information systems are at risk of being underutilized or rejected by users for...
Computer Evidence: Collection & Preservation (Networking Series)
Computer Evidence: Collection & Preservation (Networking Series)
Learn to Collect Digital Artifacts and Ensure Evidence Acceptance!

Computer Evidence: Collection and Preservation teaches law enforcement and computer forensics investigators how to identify, collect, and maintain digital artifacts to preserve their reliability for admission as evidence. The book focuses on collection and preservation because...

Database Design (Mcgraw Hill Computer Science Series)
Database Design (Mcgraw Hill Computer Science Series)
The material in this book is the result of courses given at Stanford University as “File and Database Structures” since 1971. Initially little coherent published material was available, even though a large number of references could be cited.

In particular, no clear definition of the concept of a schema was available. Now
...
Role-Based Access Control, Second Edition
Role-Based Access Control, Second Edition
Role-based access control (RBAC) is a security mechanism that has gained wide acceptance in the field because it can greatly lower the cost and complexity of securing large networked and Web-based systems. Written by leading experts, this newly revised edition of the Artech House bestseller, Role-Based Access Control, offers practitioners...
Engineering Documentation Control Handbook, 3rd Edition
Engineering Documentation Control Handbook, 3rd Edition
The wide acceptance of this book has been very gratifying. This work seems to have taken on a life of its own. The publisher wrote: “Your book over the last year has resulted in the most ‘Buy This Book’ links of our entire catalog … It is very well received by the ‘Googleites.’ ” Sales have exceeded 10,000...
Leading in Inter-Organizational Networks: Towards a Reflexive Practice
Leading in Inter-Organizational Networks: Towards a Reflexive Practice

In view of the rising importance and prevalence of network-based collaboration, this book aims to meet the need for more theory in this area. Theoretically conceptualizing and empirically describing the practice of reflexive leadership in inter-organisational networks, it explores how member organisations approach reflexive...

unlimited object storage image
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy