Home | Amazing | Today | Tags | Publishers | Years | Search 
Nine Algorithms That Changed the Future: The Ingenious Ideas That Drive Today's Computers
Nine Algorithms That Changed the Future: The Ingenious Ideas That Drive Today's Computers
Computing is transforming our society in ways that are as profound as the changes wrought by physics and chemistry in the previous two centuries. Indeed, there is hardly an aspect of our lives that hasn't already been influenced, or even revolutionized, by digital technology. Given the importance of computing to modern society,...
Net Locality: Why Location Matters in a Networked World
Net Locality: Why Location Matters in a Networked World
A man is walking down Michigan Avenue in Chicago. He shares a sidewalk with crowds of anonymous people. He sees skyscrapers and signage extending to the horizon. There is a lot going on – people talking, walking, playing, fighting, screaming, driving, and smiling. He sees a coffee shop that excites his interest. He pulls...
Ambient Intelligence - Software and Applications: 3rd International Symposium on Ambient Intelligence
Ambient Intelligence - Software and Applications: 3rd International Symposium on Ambient Intelligence

Ambient Intelligence (AmI) is a recent paradigm emerging from Artificial Intelligence (AI), where computers are used as proactive tools assisting people with their day-to-day activities, making everyone’s life more comfortable. Another main concern of AmI originates from the human computer interaction domain and focuses on offering ways...

Introduction to Biometrics
Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic commerce, and welfare disbursement require reliable person recognition systems. Traditional person authentication methods based on passwords and identity documents often fail to meet the stringent security and performance demands of these...
Ubiquitous Multimedia and Mobile Agents: Models and Implementations
Ubiquitous Multimedia and Mobile Agents: Models and Implementations

Ubiquitous multimedia systems, or mobile multimedia systems, offer the promise of pervasive delivery of multimedia content to mobile users and their handheld devices.

Ubiquitous Multimedia and Mobile Agents: Models and Implementations provides the hybridization of two paradigms, namely, ubiquitous/mobile multimedia and mobile...

Android Forensics: Investigation, Analysis and Mobile Security for Google Android
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
The Android mobile platform has quickly risen from its first phone in October 2008 to the most popular mobile operating system in the world by early 2011. The explosive growth of the platform has been a significant win for consumers with respect to competition and features. However, forensic analysts and security engineers have...
Bioassay Techniques for Drug Development
Bioassay Techniques for Drug Development

The so-called “green wave”, triggered by a growing ecological awareness, has resulted in an increased interest in herbal formulations throughout the world, particularly in the last decade. The consumption of medicinal plants has almost doubled in the West during that period. The efficacy of a number of herbal formulations...

Hacking the Human
Hacking the Human

Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on systems and attackers are rarely required to find technical vulnerabilities, hacking the human is usually sufficient.Ian Mann turns the black art of...

Location-Based Information Systems: Developing Real-Time Tracking Applications
Location-Based Information Systems: Developing Real-Time Tracking Applications

Location-based services (LBS) are nally coming out of research labs and getting into the hands of nal users. It is fairly common to see cellular carriers and private companies o ering LBS to locate your children, friends, and sites of interest, track assets, enhance the security of key personnel, help people with disabilities use...

SQL Server DMVs in Action: Better Queries with Dynamic Management Views
SQL Server DMVs in Action: Better Queries with Dynamic Management Views

When I first discovered DMVs, I was enthralled because they made many difficult things so easy. It was simple to identify, typically within seconds, the core performance problems that affect SQL Server databases. For example, I could quickly discover which queries were taking the longest time to run, which indexes were missing, and...

Nurse's Pocket Guide: Diagnoses, Prioritized Interventions, and Rationale 10th Editions
Nurse's Pocket Guide: Diagnoses, Prioritized Interventions, and Rationale 10th Editions

The American Nurses Association (ANA) Social Policy Statement of 1980 was the first to define nursing as the diagnosis and treatment of human responses to actual and potential health problems. This definition, when combined with the ANA Standards of Practice, has provided impetus and support for the use of nursing diagnosis. Defining nursing...

Persons, Souls and Death: A Philosophical Investigation of an Afterlife
Persons, Souls and Death: A Philosophical Investigation of an Afterlife

Awareness of mortality is the price of intelligent consciousness. This book argues that a person is essentially an immaterial subject of conscious states who, though intimately linked by causal ties to the body, is nevertheless distinct from it. The book also examines apparently paranormal occurrences supporting the belief that some persons...

Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy