Home | Amazing | Today | Tags | Publishers | Years | Search 
Workflow Modeling: Tools for Process Improvement and Application Development
Workflow Modeling: Tools for Process Improvement and Application Development
Just when process orientation has become mainstream thinking for business people and
systems people alike, it seems that the flow of process-oriented literature has pretty well
stopped. So here we are, thousands of us, up to our necks in process improvement and
information systems projects, finding that there is a real shortage of
...
Multicarrier Techniques for 4G Mobile Communications
Multicarrier Techniques for 4G Mobile Communications
At recent major international conferences on wireless communications,
there have been several sessions on beyond third generation (3G) or fourth
generation (4G) mobile communications systems, where modulation/demodulation
and multiplexing/multiple access schemes related to multicarrier
techniques have drawn a lot of attention.
...
Outsourcing Information Security (Computer Security Series)
Outsourcing Information Security (Computer Security Series)
This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book...
QoS in Integrated 3G Networks
QoS in Integrated 3G Networks
This book is intended to provide a self-contained general understanding of the factors that determine quality of service (QoS) in a third-generation (3G) mobile network that interacts with other fixed networks. Since QoS is an end-end quantity, and the mobile networks interact both with each other and with fixed networks, the discussion includes...
Open Systems And Standards For Software Product Development
Open Systems And Standards For Software Product Development
This groundbreaking resource offers you new insights for building and evolving open systems using the best mix of standards for your software development projects. Numerous books have been published that describe individual computer standards, but only Open Systems and Standards for Software Product Development presents a framework for...
Techniques and Applications of Digital Watermarking and Content Protection
Techniques and Applications of Digital Watermarking and Content Protection
Whether you need to quickly come up to speed on the state of the art in digital watermarking or want to explore the latest research in this area, such as 3-D geometry watermarking, this timely reference gives you the hands-on knowledge you need for your work. This book covers the full range of media -- still images, audio data, video, 3-D geometry...
RFID-Enabled Sensor Design and Applications (Integrated Microsystems)
RFID-Enabled Sensor Design and Applications (Integrated Microsystems)

Radio frequency identification (RFID) is gaining in popularity, especially as we find ourselves in this communications age and headed towards a ubiquitous computing world. Automatic identification systems become an important aspect not just in today’s technology but also as part of our daily life. We need RFID in our cars,...

Role-Based Access Control
Role-Based Access Control

Role-based access control (RBAC) is a technology that is attracting a great deal of attention, particularly for commercial applications, because of its potential for reducing the complexity and cost of security administration in large networked applications. Under RBAC, security administration is greatly simplified by using roles,...

Digital Terrain Modeling: Acquisition, Manipulation And Applications
Digital Terrain Modeling: Acquisition, Manipulation And Applications

With its expanding array of applications in everything from biodiversity modeling to wireless communications, it's no wonder digital terrain modeling (DTM) - the electronic process of representing topography in three dimensions -- is a hot subject among engineers and geoscientists. This concise resource is the first truly complete guide...

Navigation Signal Processing for GNSS Software Receivers (Gnss Technology and Applications)
Navigation Signal Processing for GNSS Software Receivers (Gnss Technology and Applications)

The continuous developments of software-defined radio technology resulted in the appearance of the first real-time GPS software radios at the beginning of this century. For the first time, it was possible to realize a complete GNSS receiver without going into the depths of cumbersome hardware development that requires development or...

GNSS Receivers for Weak Signals
GNSS Receivers for Weak Signals

Many important GPS applications such as the positioning of wireless devices, tracking during ionospheric scintillation, and orbit determination of geostationary and high Earth orbit satellites require a GNSS (global navigation satellite system) receiver with the ability to work with weak signals. This first-of-its-kind book addresses this...

Identity Management: Concepts, Technologies, and Systems
Identity Management: Concepts, Technologies, and Systems

Digital identity can be defined as the digital representation of the information known about a specific individual or organization. Digital identity management technology is an essential function in customizing and enhancing the network user experience, protecting privacy, underpinning accountability in transactions and interactions, and...

Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy