Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Art of Multiprocessor Programming
The Art of Multiprocessor Programming
The first text and reference on this sea change in the computer industry

This book is the first comprehensive presentation of the principles and tools available for programming multiprocessor machines. It is of immediate use to programmers working with the new architectures. For example, the next generation of computer game
...
The Ultimate Palm Robot
The Ultimate Palm Robot

No programming required--CD includes software

Now, anyone curious about robotics can inexpensively build and enjoy their very own robot using any Palm handheld for the brains. Originally developed by Carnegie Mellon University robotics department graduate students, this prototype has enjoyed a cult following among enthusiasts. Using...

How to Feed Friends and Influence People: The Carnegie Deli...A Giant Sandwich, a Little Deli, a Huge Success
How to Feed Friends and Influence People: The Carnegie Deli...A Giant Sandwich, a Little Deli, a Huge Success
the show--and the deli--must go on
In the early morning hours of February 7th, the Carnegie Deli experienced its most unusual takeout order: armed robbers wanted the cash.
The deli always stayed open until 4 a.m. and then re-opened its doors at 6 a.m. The seven robbers must have canvassed the place or received an inside tip about the
...
Mind Design II: Philosophy, Psychology, and Artificial Intelligence
Mind Design II: Philosophy, Psychology, and Artificial Intelligence
"Ming Design II is a welcome update of its predecessor, itself a useful compendium on the philosophy of cognitive science. This new volume retains the intellectual foundations, and some discussions of classical AI built on them, while adding connectionism, situated AI, and dynamic systems theory as extra storeys. Which of these is...
Network Processor Design, Volume 2: Issues and Practices, Volume 2
Network Processor Design, Volume 2: Issues and Practices, Volume 2
Responding to ever-escalating requirements for performance, flexibility, and economy, the networking industry has opted to build products around network processors. To help meet the formidable challenges of this emerging field, the editors of this volume created the first Workshop on Network Processors, a forum for scientists and engineers to...
Handbook of Enterprise Systems Architecture in Practice
Handbook of Enterprise Systems Architecture in Practice
I am not sure exactly when the importance of enterprise architecture (EA) dawned on me. What is clear is that it wasn’t a “one fine day” realization, rather a result of numerous conversations with CIOs, IT managers, CFOs, process managers, and multiple research studies that convinced me that EA is perhaps the most important and...
Topology Control in Wireless Ad Hoc and Sensor Networks
Topology Control in Wireless Ad Hoc and Sensor Networks
Topology control is fundamental to solving scalability and capacity problems in large-scale wireless ad hoc and sensor networks. 

Forthcoming wireless multi-hop networks such as ad hoc and sensor networks will allow network nodes to control the communication topology by choosing their transmitting...

Quiet: The Power of Introverts in a World That Can't Stop Talking
Quiet: The Power of Introverts in a World That Can't Stop Talking

At least one-third of the people we know are introverts. They are the ones who prefer listening to speaking, reading to partying; who innovate and create but dislike self-promotion; who favor working on their own over brainstorming in teams. Although they are often labeled "quiet," it is to introverts that we owe many of the great...

CMMI for Development: Implementation Guide
CMMI for Development: Implementation Guide

Apply best practices and proven methods to ensure a successful CMMi implementation. This practical book shows you which implementation hurdles to avoid and which CMMi best practices to apply in your work areas. You'll experience how easy the CMMi practice description is and how quickly and efficiently it can be implemented into...

Intelligent Tutoring Systems: 10th International Conference, ITS 2010, Pittsburgh, PA
Intelligent Tutoring Systems: 10th International Conference, ITS 2010, Pittsburgh, PA

The 10th International Conference on Intelligent Tutoring Systems, ITS 2010, continued the bi-annual series of top-flight international conferences on the use of advanced educational technologies that are adaptive to users or groups of users. These highly interdisciplinary conferences bring together researchers in the learning sciences,...

Secure Coding: Principles and Practices
Secure Coding: Principles and Practices
Despite their myriad manifestations and different targets, nearly all attacks on computer systems have one fundamental cause: the code used to run far too many systems today is not secure. Flaws in its design, implementation, testing, and operations allow attackers all-too-easy access. Secure Coding: Principles &...
The CISSP Prep Guide: Gold Edition
The CISSP Prep Guide: Gold Edition
An arsenal of inside information on CISSP and how to master the certification test!

More and more frequently, corporations are requiring that their employees provide professional certifications to prove that they possess the core competencies to do their technical jobs. The Certified Information Systems Security Professional examination (CISSP)...

unlimited object storage image
Result Page: 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy