Home | Amazing | Today | Tags | Publishers | Years | Search 
Multimedia Encryption and Authentication Techniques and Applications (Internet and Communications)
Multimedia Encryption and Authentication Techniques and Applications (Internet and Communications)

Recent advances in digital communications and storage technologies have brought major changes for consumers. High-capacity hard disks and DVDs can store large amounts of audiovisual data. In addition, faster Internet connection speeds and the emerging high bitrate DSL connections provide sufficient bandwidth for entertainment...

Multimodal Usability (Human-Computer Interaction Series)
Multimodal Usability (Human-Computer Interaction Series)

This preface tells the story of how Multimodal Usability responds to a special challenge. Chapter 1 describes the goals and structure of this book.

The idea of describing how to make multimodal computer systems usable arose in the European Network of Excellence SIMILAR – “Taskforce for creating human-machine...

Advanced Simulation and Test Methodologies for VLSI Design
Advanced Simulation and Test Methodologies for VLSI Design

With the advent of LSI and subsequently VLSI, technology has never witnessed such an unprecedented growth in the use of electronic systems in a wide range of applications. Although the ability to integrate several hundreds of thousands of transistors into a monolithic integrated circuit offers many advantages, a major concern in the...

Digital Signal Processing with Field Programmable Gate Arrays (With CD-ROM)
Digital Signal Processing with Field Programmable Gate Arrays (With CD-ROM)

Field-Programmable Gate Arrays (FPGAs) are on the verge of revolutionizing digital signal processing. Novel FPGA families are replacing ASICs and PDSPs for front end digital signal processing algorithms more and more. The efficient implementation of these algorithms is the main goal of this book. It starts with an overview of today's FPGA...

Metasploit: The Penetration Tester's Guide
Metasploit: The Penetration Tester's Guide
"The best guide to the Metasploit Framework." —HD Moore, Founder of the Metasploit Project

The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for...

Anticipatory Optimization for Dynamic Decision Making (Operations Research/Computer Science Interfaces Series)
Anticipatory Optimization for Dynamic Decision Making (Operations Research/Computer Science Interfaces Series)

Anticipatory optimization for dynamic decision making relies on a number of different scientific disciplines. On a general level, the foundations of the field may be localized at the intersection of operations research, computer science and decision theory. Closer inspection reveals the important role of branches such as simulation,...

Flash CS5.5: The Missing Manual
Flash CS5.5: The Missing Manual

Flash’s evolution is unique, even for the fast-changing computer software world. First released in 1996 under the name FutureSplash, it was a tool for creating web-based animations. It’s still the go-to application for that job; however, along the way it’s acquired new capabilities. Today, Flash powers...

Handbook of Open Source Tools
Handbook of Open Source Tools

The constant and speedy progress made by humankind in the industrial revolution, and more recently in the information technology era can be directly attributed to sharing of knowledge between various disciplines, reuse of the knowledge as science and technology advanced, and inclusion of this knowledge in the curriculum. The phrases...

Mathematics for Multimedia
Mathematics for Multimedia

Beautiful mathematical ideas abound in multimedia software! Some are not encountered until late in undergraduate or even postgraduate study, whereas they can be appreciated and used much earlier. This book presents a few dozen such pearls, strung together by their ubiquity in many applications. It is based on the course Topics in...

Data Mining and Machine Learning in Cybersecurity
Data Mining and Machine Learning in Cybersecurity

In the emerging era of Web 3.0, securing cyberspace has gradually evolved into a critical organizational and national research agenda inviting interest from a multidisciplinary scientific workforce. There are many avenues into this area, and, in recent research, machine-learning and data-mining techniques have been applied to design,...

VMware vSphere PowerCLI Reference: Automating vSphere Administration
VMware vSphere PowerCLI Reference: Automating vSphere Administration

The book is, of course, primarily targeted at administrators of vSphere environments who want to automate tasks. But the subjects that we discuss in the book cover so many aspects of the management of a VMware vSphere environment that everyone who comes into contact with a VMware vSphere environment will be able to pick up something...

Airplane Flight Dynamics and Automatic Flight Controls: Part 2
Airplane Flight Dynamics and Automatic Flight Controls: Part 2

In this two-part textbook, methods are presented for analysis and synthesis of the steady state and perturbed state (open and closed loop) stability and control of fixed wing aircraft. Part I contains Chapters 1-6 and Appendices A-D. Part II contains Chapters 7-12 as well as Appendix E.

The book is aimed at junior, senior and...

Result Page: 513 512 511 510 509 508 507 506 505 504 503 502 501 500 499 498 497 496 495 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy