Home | Amazing | Today | Tags | Publishers | Years | Search 
Grid Resource Management: Towards Virtual and Services Compliant Grid Computing
Grid Resource Management: Towards Virtual and Services Compliant Grid Computing
Grid technology offers the potential for providing secure access to remote services, thereby promoting scientific collaborations in an unprecedented scale. Grid Resource Management: Toward Virtual and Services Compliant Grid Computing presents a comprehensive account of the architectural issues of grid technology, such as security,...
Modeling Decisions: Information Fusion and Aggregation Operators (Cognitive Technologies)
Modeling Decisions: Information Fusion and Aggregation Operators (Cognitive Technologies)
Information fusion techniques and aggregation operators produce the most comprehensive, specific datum about an entity using data supplied from different sources, thus enabling us to reduce noise, increase accuracy, summarize and extract information, and make decisions. These techniques are applied in fields such as economics, biology and...
Interoperability of Enterprise Software and Applications
Interoperability of Enterprise Software and Applications
Interoperability: the ability of a system or a product to work with other systems or products without special effort from the user is a key issue in manufacturing and industrial enterprise generally. It is fundamental to the production of goods and services quickly and at low cost at the same time as maintaining levels of quality and customisation....
Creative Environments: Issues of Creativity Support for the Knowledge Civilization Age (Studies in Computational Intelligence)
Creative Environments: Issues of Creativity Support for the Knowledge Civilization Age (Studies in Computational Intelligence)
Creative Environments is a follow-up on the book Creative Space in the same series and by the same authors, serving this time as editors of a broader book on computational intelligence and knowledge engineering tools for supporting knowledge creation. This book contains four parts. The first part presents a further development of models of...
Network Query Language with CDROM
Network Query Language with CDROM
Learn about an exciting new technology that is revolutionizing network and Internet content delivery

As the first pure language of the content engineering era, Network Query Language (NQL) is the ultimate tool for rapid and simple development of intelligent agents, bots, spiders, middleware, and scalable business-to-business content aggregation...

Fast SOA: The way to use native XML technology to achieve Service Oriented Architecture governance, scalability, and performance
Fast SOA: The way to use native XML technology to achieve Service Oriented Architecture governance, scalability, and performance
FastSOA is a great book with lots of meat on the bones and practical real-world XML and SOA knowledge. Much of what passes for SOA right now is simply block diagrams and vague exhortations to get the architecture right. Frank Cohen gives a practical guide to what software developers, architects, and CIOs have to do to deliver highly scalable,...
Fuzzy Sets and Fuzzy Logic: Theory and Applications
Fuzzy Sets and Fuzzy Logic: Theory and Applications
Reflecting the tremendous advances that have taken place in the study of fuzzy set theory and fuzzy logic from 1988 to the present, this book not only details the theoretical advances in these areas, but considers a broad variety of applications of fuzzy sets and fuzzy logic as well. Theoretical aspects of fuzzy set theory and fuzzy...
Building a Web 2.0 Portal with ASP.NET 3.5
Building a Web 2.0 Portal with ASP.NET 3.5
If you think you're well versed in ASP.NET, think again. This exceptional guide gives you a master class in site building with ASP.NET 3.5 and other cutting-edge Microsoft technologies. You learn how to develop rock-solid web portal applications that can withstand millions of hits every day while surviving scalability and security pressures -- not...
Security Monitoring with Cisco Security MARS (Networking Technology: Security)
Security Monitoring with Cisco Security MARS (Networking Technology: Security)
Learn the differences between various log aggregation and correlation systems
  • Examine regulatory and industry requirements
  • Evaluate various deployment scenarios
  • Properly size your deployment
  • Protect the Cisco Security MARS appliance from attack
  • Generate reports,...
The Definitive Guide to the Microsoft Enterprise Library
The Definitive Guide to the Microsoft Enterprise Library
The Definitive Guide to the Microsoft Enterprise Library introduces one of the most exciting and popular .NET-oriented initiatives, the Enterprise Library. The EL offers nine classes of reusable code, or blocks, that are used to solve a variety of common problem spaces. These problems cover a number of topics, including configuration, data...
Encyclopedia of Internet Technologies and Applications
Encyclopedia of Internet Technologies and Applications
Before the invention of the World Wide Web, computer communications were mainly associated with the data transmission and reception among computers. The invention of the Web by Tim Berners-Lee in 1989, led to a deep change of this paradigm, imposing the share of information over the data transmission. After the invention of the Web, Internet refers...
Security in Distributed, Grid, Mobile, and Pervasive Computing
Security in Distributed, Grid, Mobile, and Pervasive Computing
Despite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, Security in Distributed, Grid, Mobile, and Pervasive Computing focuses on the increasing demand to guarantee...
Result Page: 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy