Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Elements of Programming
Elements of Programming
Elements of Programming provides a different understanding of programming than is presented elsewhere. Its major premise is that practical programming, like other areas of science and engineering,must be based on a solid mathematical foundation. The book shows that algorithms implemented in a real programming language,...
Modeling and Analysis of Telecommunications Networks
Modeling and Analysis of Telecommunications Networks
A timely and relevant analysis of today's complex call models
In today's world of ever-expanding telecommunications options, here is an advanced-level text that covers the mathematical methods used in the analysis of modern telecom networks, with emphasis on a variety of call models such as quality of service (QoS) in
...
Turing (A Novel about Computation)
Turing (A Novel about Computation)
Our hero is Turing, an interactive tutoring program and namesake (or virtual emanation?) of Alan Turing, World War II code breaker and father of computer science. In this unusual novel, Turing's idiosyncratic version of intellectual history from a computational point of view unfolds in tandem with the story of a love affair involving Ethel, a...
Network Processor Design, Volume 2: Issues and Practices, Volume 2
Network Processor Design, Volume 2: Issues and Practices, Volume 2
Responding to ever-escalating requirements for performance, flexibility, and economy, the networking industry has opted to build products around network processors. To help meet the formidable challenges of this emerging field, the editors of this volume created the first Workshop on Network Processors, a forum for scientists and engineers to...
Conquest in Cyberspace: National Security and Information Warfare
Conquest in Cyberspace: National Security and Information Warfare
With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corrupting their workings, and shutting them down. Modern societies...
Wireless Sensor Network Designs
Wireless Sensor Network Designs
Wireless Sensors are small, cheap, low maintenance and will revolutionize wireless communications.

’Wireless sensor networks’ is a rapidly growing discipline with new technologies emerging, new applications being developed and standards being finalized. Sensors and actuators allow for entirely new kinds of...

Practical Programming in Tcl and Tk
Practical Programming in Tcl and Tk

Completely-updated Tcl/Tk best-seller! Extensive new coverage of UNIX, Windows and Macintosh Tcl/Tk.

Authored by a member of the Tcl/Tk development team, Practical Programming in Tcl and Tk is the most comprehensive, practical guide to Tcl and Tk available. Beginners can rely on this book for a thorough, well-organized...

PHP 6 and MySQL 5 for Dynamic Web Sites: Visual QuickPro Guide
PHP 6 and MySQL 5 for Dynamic Web Sites: Visual QuickPro Guide
It hasn't taken Web developers long to discover that when it comes to creating dynamic, database-driven Web sites, MySQL and PHP provide a winning open source combination. Add this book to the mix, and there's no limit to the powerful, interactive Web sites that developers can create. With step-by-step instructions, complete scripts, and expert...
ESD in Silicon Integrated Circuits
ESD in Silicon Integrated Circuits

In the seven years since the first edition of this book was completed, Electrostatic Discharge (ESD) phenomena in integrated circuits (IC) continues to be important as technologies shrink and the speed and size of the chips increases. The phenomena related to ESD events in semiconductor devices take place outside the realm of normal device...

Modeling for Insight: A Master Class for Business Analysts
Modeling for Insight: A Master Class for Business Analysts
Praise for Modeling for Insight

"Most books on modeling are either too theoretical or too focused on the mechanics of programming. Powell and Batt's emphasis on using simple spreadsheet models to gain business insight (which is, after all, the name of the game) is what makes this book stand head and shoulders...

Evolutionary Computation 1: Basic Algorithms and Operators
Evolutionary Computation 1: Basic Algorithms and Operators
The original Handbook of Evolutionary Computation (Back et a1 1997) was designed to fulfil1 the need for a broad-based reference book reflecting the important role that evolutionary computation plays in a variety of disciplinesranging from the natural sciences and engineering to evolutionary biology and computer...
Interprocess Communications in Linux®: The Nooks & Crannies
Interprocess Communications in Linux®: The Nooks & Crannies

The topic of interprocess communication techniques is broad, challenging and dynamic. All but the most basic operating systems provide methods for processes communication. Early on, UNIX supported a number of rudimentary process communication constructs (such as lock files, signals and pipes). In the early 1980s, facilities such...

unlimited object storage image
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy