Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Introduction to Logistics Systems Planning and Control (Wiley Interscience Series in Systems and Optimization)
Introduction to Logistics Systems Planning and Control (Wiley Interscience Series in Systems and Optimization)
Logistic systems constitute one of the cornerstones in the design and control of production systems and the modelling of supply chains. They are key to a number of industries, and courses teaching logistics systems planning and control are becoming more widespread. Introduction to Logistics Systems Planning and Control is the first book to...
The Next Wave in Computing, Optimization, and Decision Technologies
The Next Wave in Computing, Optimization, and Decision Technologies
Brown et al. (2004) (see also Reed 1994 and Skroch 2004) model the
completion of an adversarial nation’s nuclear-weapons program using
general techniques of PERT. (See PERT 1958 and Malcolm et al. 1959
for the original descriptions of PERT, and see Moder et al. 1983 for a
comprehensive review.) Brown et al. (2004) ask the
...
Ambient Intelligence: A Novel Paradigm
Ambient Intelligence: A Novel Paradigm
If the space around us could adapt to our needs and intentions, then our lives
would be much simpler. We would have to spend less time on our daily chores,
we would be more productive and, hopefully, we would live in a less worrisome
and, most likely, more secure world.

Ideally, it would be great if we could live our lives
...
Hacking del.icio.us
Hacking del.icio.us
I wrote this book with tinkerers in mind—that is to say, tinkerers of various levels of familiarity with del.icio.us in particular and Web development skill in general.Whether you’re just getting on your way to being a power user at del.icio.us, or whether you’re a hardcore Web development guru who’s running your own...
Jess in Action: Java Rule-Based Systems
Jess in Action: Java Rule-Based Systems
A practical handbook for anyone interested in programming rule-based systems and written by the creator of the popular Java rule engine, Jess, this book is structured around a series of large, fully developed practical examples of rule-based programming in Java. After the topic of rule-based systems is introduced, software developers and...
CSS Cookbook, 2nd Edition
CSS Cookbook, 2nd Edition

As the industry standard method for enriching the presentation of HTML-based web pages, Cascading Style Sheets (CSS) allow you to give web pages more structure and a more sophisticated look. But first, you have to get past CSS theory and resolve real-world problems.

For those all-too-common dilemmas that...

Deploying Cisco Voice over IP Solutions
Deploying Cisco Voice over IP Solutions
If you've got a wide area network (WAN) already, putting interoffice voice traffic on it is an obvious application for it. Voice signals take up so little bandwidth, and the cost savings can be so significant, that Voice over IP (VoIP) deserves serious consideration. However, you can easily throw away years of cost savings by bringing in...
The Book of IRC: The Ultimate Guide to Internet Relay Chat
The Book of IRC: The Ultimate Guide to Internet Relay Chat
ICQ and other new-fangled chat applications may get most of the press, but Internet Relay Chat (IRC) remains the Wild West of real-time online conversations. Populated by the most diverse collection of characters this side of the Mos Eisley cantina scene in Star Wars, IRC will keep you up late chatting with people all over the world. The...
MPLS Fundamentals
MPLS Fundamentals
As an escalation engineer, I experienced the boom of Multiprotocol Label Switching (MPLS) networking first hand. I saw the first trials of MPLS in service provider networks and saw MPLS successfully expanding further into enterprise networks. In addition, I witnessed new MPLS technologies coming into existence, which the networking industry...
Security for Wireless Ad Hoc Networks
Security for Wireless Ad Hoc Networks
Wireless networks, whether cellular networks or wireless local area networks (LANs), have rapidly become an indispensable part of our life. Evidence of this is the widespread usage of such networks in several areas such as office, home, universities, hot-spots such as airports and hotels etc. In addition, the widespread availability of miniature...
Spread Spectrum and CDMA: Principles and Applications
Spread Spectrum and CDMA: Principles and Applications
Spread spectrum and CDMA are cutting-edge technologies widely used in operational radar, navigation and telecommunication systems and play a pivotal role in the development of the forthcoming generations of systems and networks.

This comprehensive resource presents the spread spectrum concept as a product of the advancements in wireless IT,...

Computational Approaches to Biochemical Reactivity (Understanding Chemical Reactivity)
Computational Approaches to Biochemical Reactivity (Understanding Chemical Reactivity)
This book summarises recent results in the rapidly developing discipline of the computational aspects of biochemical reactivity. It presents a comprehensive and critical treatise on the subject, with numerous references covering practically all relevant and recent work. The chapters, written by eminent experts in the field, deal with quantum...
unlimited object storage image
Result Page: 1454 1453 1452 1451 1450 1449 1448 1447 1446 1445 1444 1443 1442 1441 1440 1439 1438 1437 1436 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy