Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Sensor Technology Handbook
Sensor Technology Handbook
The first decade of the 21st century has been labeled by some as the “Sensor Decade.”
With a dramatic increase in sensor R&D and applications over the past 15 years, sensors
are certainly poised on the brink of a revolution similar to that experienced in
microcomputers in the 1980s. Just in automobiles alone, sensing
...
Introduction to Simulink with Engineering Applications
Introduction to Simulink with Engineering Applications
    This text is an introduction to Simulink ®, a companion application to MATLAB ®. It is written for students at the undergraduate and graduate programs, as well as for the working professional. Although some previous knowledge of MATLAB would be helpful, it is not absolutely necessary; Appendix A of this text is an...
Inside Direct3D (Dv-Mps Inside)
Inside Direct3D (Dv-Mps Inside)

With the introduction of Microsoft Windows 95, game developers had the opportunity to develop Windows-based games that were far more powerful than was possible with earlier versions of Windows. Even with this capability, however, accessing the multimedia hardware consistently and efficiently was no easy task—that is, until Microsoft...

Objects, Components, and Frameworks with UML: The Catalysis(SM) Approach
Objects, Components, and Frameworks with UML: The Catalysis(SM) Approach

". . . We found Catalysis to be the first comprehensive object-oriented methodology to unify the concepts of objects, frameworks, and component technologies."
John McGehee, Senior Architect, Texas Instruments Works Project

Objects, Components, and Frameworks with UML: The Catalysis Approach is where you will...

User's Guide To Cryptography And Standards (Artech House Computer Security)
User's Guide To Cryptography And Standards (Artech House Computer Security)
This book is about standards, cryptography, and standards for cryptography. It has been written in the hope that it will
serve a number of purposes, including the following.

◗ Perhaps most importantly, to provide a general introduction
to standardized cryptography for the user of this technology (i.e., a designer or
...
J2EE and XML Development
J2EE and XML Development
Geared toward experienced developers, this reference demonstrates how Java 2 Platform, Enterprise Edition (J2EE), and XML technologies can be used together to create more robust distributed applications and software systems. The use of XML technology to extend and enhance the capabilities of the J2EE platform is covered in detail. Discussed...
Optical Switching  and Networking Handbook
Optical Switching and Networking Handbook
Before you begin to read this book, please take a moment to read these introductory comments. The title of the book may be misleading for many people:

For the engineering person, this may sound like the bible of optical networks and switching systems. Not so! This is not an engineering book and will not dig into the gory details of bits
...
Building a Web 2.0 Portal with ASP.NET 3.5
Building a Web 2.0 Portal with ASP.NET 3.5
If you think you're well versed in ASP.NET, think again. This exceptional guide gives you a master class in site building with ASP.NET 3.5 and other cutting-edge Microsoft technologies. You learn how to develop rock-solid web portal applications that can withstand millions of hits every day while surviving scalability and security pressures -- not...
Deploying Cisco Wide Area Application Services (Networking Technology)
Deploying Cisco Wide Area Application Services (Networking Technology)

Design and deploy Cisco WAN optimization and application acceleration solutions for the enterprise WAN

Today, IT organizations are increasingly squeezed by competing demands. They must support more distributed users who demand greater availability and performance. They must protect their digital assets...

Computational Approaches to Morphology and Syntax (Oxford Surveys in Syntax & Morphology)
Computational Approaches to Morphology and Syntax (Oxford Surveys in Syntax & Morphology)
"This book should undoubtedly be of great interest to students and researchers of morphology, syntax, computational linguistics, and natural language processing. The book provides an excellent systematics overivew of the current state-of-the-art of the field. The book includes extensive descriptions of the formal characterization of...
Dojo: Using the Dojo JavaScript Library to Build Ajax Applications (Developer's Library)
Dojo: Using the Dojo JavaScript Library to Build Ajax Applications (Developer's Library)
Dojo offers Web developers and designers a powerful JavaScript toolkit for rapidly developing robust Ajax applications. Now, for the first time, there’s a complete, example-rich developer’s guide to Dojo and its growing library of prepackaged widgets. Reviewed and endorsed by the Dojo Foundation, the creators of Dojo, this book brings...
Computable Models
Computable Models
Computational models can be found everywhere in present day science and engineering. In providing a logical framework and foundation for the specification and design of specification languages, Raymond Turner uses this framework to introduce and study computable models. In doing so he presents the first systematic attempt to provide computational...
unlimited object storage image
Result Page: 604 603 602 601 600 599 598 597 596 595 594 593 592 591 590 589 588 587 586 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy