Home | Amazing | Today | Tags | Publishers | Years | Search 
Multicarrier Techniques for 4G Mobile Communications
Multicarrier Techniques for 4G Mobile Communications
At recent major international conferences on wireless communications,
there have been several sessions on beyond third generation (3G) or fourth
generation (4G) mobile communications systems, where modulation/demodulation
and multiplexing/multiple access schemes related to multicarrier
techniques have drawn a lot of attention.
...
Outsourcing Information Security (Computer Security Series)
Outsourcing Information Security (Computer Security Series)
This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book...
QoS in Integrated 3G Networks
QoS in Integrated 3G Networks
This book is intended to provide a self-contained general understanding of the factors that determine quality of service (QoS) in a third-generation (3G) mobile network that interacts with other fixed networks. Since QoS is an end-end quantity, and the mobile networks interact both with each other and with fixed networks, the discussion includes...
Open Systems And Standards For Software Product Development
Open Systems And Standards For Software Product Development
This groundbreaking resource offers you new insights for building and evolving open systems using the best mix of standards for your software development projects. Numerous books have been published that describe individual computer standards, but only Open Systems and Standards for Software Product Development presents a framework for...
Techniques and Applications of Digital Watermarking and Content Protection
Techniques and Applications of Digital Watermarking and Content Protection
Whether you need to quickly come up to speed on the state of the art in digital watermarking or want to explore the latest research in this area, such as 3-D geometry watermarking, this timely reference gives you the hands-on knowledge you need for your work. This book covers the full range of media -- still images, audio data, video, 3-D geometry...
Handbook of Research on Web Information Systems Quality
Handbook of Research on Web Information Systems Quality
Web information systems engineering resolves the multifaceted issues of Web-based systems development; however, as part of an emergent yet prolific industry, Web site quality assurance is a continually adaptive process needing a comprehensive reference tool to merge all cutting-edge research and innovations.

The Handbook of Research on Web...

Statistical and Adaptive Signal Processing: Spectral Estimation, Signal Modeling, Adaptive Filtering and Array Processing
Statistical and Adaptive Signal Processing: Spectral Estimation, Signal Modeling, Adaptive Filtering and Array Processing
This authoritative volume on statistical and adaptive signal processing offers you a unified, comprehensive and practical treatment of spectral estimation, signal modeling, adaptive filtering, and array processing. Packed with over 3,000 equations and more than 300 illustrations, this unique resource provides you with balanced coverage of...
Organic And Inorganic Nanostructures (Atrech House Mems)
Organic And Inorganic Nanostructures (Atrech House Mems)
Providing you with a comprehensive and up-to-date understanding of organic and inorganic nanostructures, this cutting-edge resource covers all aspects of this fast-growing area of nanotechnology. The book explores the technology, structure, and electrical and optical properties of organic/inorganic nanostructures, as well as their application in...
Defense and Detection Strategies against Internet Worms
Defense and Detection Strategies against Internet Worms
This is the first book focused exclusively on Internet worms, offering you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defense techniques utilizing data from live networks, real IP addresses,...
Information Operations Planning
Information Operations Planning
Information operations involve the use of military information and how it is gathered, manipulated, and fused. It includes such critical functions asintelligence, surveillance, reconnaissance, command and control, communications, and precision navigation. Separating myth from reality, this authoritative resource provides military professionals with...
Text Mining for Biology And Biomedicine
Text Mining for Biology And Biomedicine
Univ. of Manchester, UK. Text provides bioinformatic practitioners with full range of text mining techniques to help address challenges in mining biology and biomedical texts. Includes methods of natural language processing (NLP) and their application in the biological domain; various lexical, terminological, and ontological resources; and...
Information Warfare and Organizational Decision-Making
Information Warfare and Organizational Decision-Making
Organizations are among the most valuable and yet most fragile structures of our civilization. We rely on organizations to obtain information, to comprehend and process information, to accumulate and internalize information, to make decisions based in part on that information, and to execute those decisions. Organizations are ubiquitous because...
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy