|
|
|
|
| | Applied Semantic Web Technologies
Since Tim Berners-Lee’s original idea for a global system of interlinked hypertext
documents from 1989, the World Wide Web has grown into the world’s biggest
pool of human knowledge. Over the past few years, the Web has changed the way
people communicate and exchange information. It has created new business... | | Wireless Mesh NetworksWireless mesh networking is a new technology that has the potential to revolutionize how we access the Internet and communicate with co-workers and friends. Wireless Mesh Networks examines the concept and explores its advantages over existing technologies. This book explores existing and future applications, and examines how some of the networking... |
|
Software Sizing, Estimation, and Risk Management: When Performance is Measured Performance ImprovesSoftware Sizing, Estimation, and Risk Management: When Performance is Measured Performance Improves is a practical, hands-on discussion of the software estimation, planning, and control process. This includes critical factors that impact estimates, methods for selecting and applying appropriate measures to projects, proper software sizing, and... | | The Art of Software ModelingUsing a multidisciplinary approach, The Art of Software Modeling covers model theory, practice, and presentation in detail. This book describes the driving need for model creation and demonstrates how to create system models. Presenting model examples of business workflows, requirements capture, and software architecture documentation, the text... | | WiMAX: Taking Wireless to the MAXWith market value expected to reach $5 billion by 2007 and the endorsement of some of the biggest names in telecommunications, World Interoperability for Microwave Access (WiMAX) is poised to change the broadband wireless landscape. But how much of WiMAX's touted potential is merely hype? Now that several pre-WiMAX networks have been deployed, what... |
|
|
Effective Software Maintenance and Evolution: A Reuse-Based ApproachAlmost three decades ago, while teaching at Toronto’s York University, serendipity struck me in the form of frame technology. Frustrated at having to reedit my customizations over and over each time I reused my code generators, I became determined to automate the splicing process. I soon discovered I had a tiger by the tail. Tigers are... | | Information Security Fundamentals
The purpose of information security is to protect an organization’s valuable resources, such as information, computer hardware, and software. Through the selection and application of appropriate safeguards, security helps the organization’s mission by protecting its physical and financial resources, reputation, legal position,... | | Knowledge Management and E-Learning
This work embraces two heretofore distinct fields of study, knowledge management
and e-learning. In order to understand the impetus to link these two fields by a
common thread, it is necessary to understand the two fields and the focus of each.
Knowledge management (KM) has developed as a field from its roots in data
and... |
|
|
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |