 |
|
 Optical Switching NetworksOptical Switching Networks describes all the major switching paradigms developed for modern optical networks, discussing their operation, advantages, disadvantages and implementation. Following a review of the evolution of optical WDM networks, an overview of the future trends out. The latest developments in optical access, local, metropolitan, and... |  |  |  |  RF Photonic Technology in Optical Fiber LinksRF photonic components, transmission systems, and signal processing examples in optical fibers are reviewed by leading academic, government, and industry scientists working in this field. This volume introduces various related technologies such as direct modulation of laser sources, external modulation techniques, and detectors. The text is aimed... |
|
 Design Concepts in Programming LanguagesThis book is the text for 6.821 Programming Languages, an entry-level, singlesemester, graduate-level course at the Massachusetts Institute of Technology. The students that take our course know how to program and are mathematically inclined, but they typically have not had an introduction to programming language design or its mathematical... |  |  Writing Successfully in ScienceAre you a reluctant writer? If so, you are in good company. Many scientists, even the most successful ones, would rather get on with their next piece of work than settle down to reporting the last piece. But it is a fact of scientific life that every worthwhile research project must lead to publication or a written report of some kind. Each new... |  |  ANDROID A PROGRAMMERS GUIDE
Master the Android mobile development platform
Build compelling Java-based mobile applications using the Android SDK and the Eclipse open-source software development platform. Android: A Programmer's Guide shows you, step-by-step, how to download and set up all of the necessary tools, build and tune... |
|
 Handbook of Computer Crime Investigation: Forensic Tools & TechnologyComputers can be used in virtually any type of crime, ranging from cyberstalking and child pornography to financial fraud, espionage and terrorism. The Handbook of Computer crime investigation presents detailed technical information that can be used to help solve these crimes.
Following on the success of his introductory text, Digital... |  |  Traffic Engineering and QoS Optimization of Integrated Voice & Data NetworksThis book describes, analyzes, and recommends traffic engineering (TE) and quality of service (QoS) optimization methods for integrated voice/data dynamic routing networks. These functions control a network's response to traffic demands and other stimuli, such as link failures or node failures. TE and QoS optimization is concerned with measurement,... |  |  Usability: Turning Technologies into Tools"The book contains much insight." --B. Hazeltine, Computing Reviews "Unusual in that the research it brings together spans the perspectives of cognitive psychology, the sociology of work and technology, work-oriented systems design, computer-supported cooperative work, and human-computer interaction. Although most of... |
|
|
| Result Page: 718 717 716 715 714 713 712 711 710 709 708 707 706 705 704 703 702 701 700 |