|
|
|
|
Active and Programmable Networks for Adaptive Architectures and ServicesNew applications such as video conferencing, video on demand, multimedia transcoders, Voice-over-IP (VoIP), intrusion detection, distributed collaboration, and intranet security require advanced functionality from networks beyond simple forwarding congestion control techniques. Examples of advanced functionality include self-reconfiguration,... | | The Lanczos Method: Evolution and Application (Software, Environments and Tools)'I recommend this book to anyone who wants to appreciate the often subtle interactions between algorithm research and engineering applications. For the engineer, it comprehensively summarizes 25 years of intellectual development in the understanding of the basic Lanczos algorithm and its many variants. For the numerical analysts, it describes the... | | Performance Analysis of Queuing and Computer NetworksPerformance Analysis of Queuing and Computer Networks develops simple models and analytical methods from first principles to evaluate performance metrics of various configurations of computer systems and networks. It presents many concepts and results of probability theory and stochastic processes.
After an introduction to... |
|
|
|
| | Immunopharmacology of Platelets (Handbook of Immunopharmacology)
Although anucleated, blood platelets are extraordinarily
efficient cells and still the subject of fruitful investigations
in haematology, in vascular physiology, in biochemistry,
and more recently in immunology and in physiopathology
where their metabolism has been implicated
as a source of potential effector compounds. It... | | Hands-On Oracle Application Express Security: Building Secure Apex Applications
AT RECX we’ve been involved in the world of IT Security for more than a decade. We were
involved in some of the fi rst penetration tests performed in the UK, where large organizations and
government departments allowed ethical hackers into their networks to determine the risk they
faced from what are now known as cyber attacks.... |
|
|
Result Page: 435 434 433 432 431 430 429 428 427 426 425 424 423 422 421 |