Home | Amazing | Today | Tags | Publishers | Years | Search 
Wireless Communications (Wiley - IEEE)
Wireless Communications (Wiley - IEEE)

"Professor Andreas F. Molisch, renowned researcher and educator, has put together the comprehensive book, Wireless Communications. The second edition, which includes a wealth of new material on important topics, ensures the role of the text as the key resource for every student, researcher, and practitioner in the...

Nanometer CMOS RFICs for Mobile TV Applications (Analog Circuits and Signal Processing)
Nanometer CMOS RFICs for Mobile TV Applications (Analog Circuits and Signal Processing)

People often ask me why I chose to publish this work. Primarily, this book was motivated by my experience in industry after having been in the academic world for many years. We often hear about the need to bridge the gap between industry and academia, but one can easily intellectually understand something without having experienced it...

Beginning Android Tablet Application Development (Wrox Programmer to Programmer)
Beginning Android Tablet Application Development (Wrox Programmer to Programmer)

I FIRST STARTED PLAYING WITH THE ANDROID SDK before it was offi cially released as a 1.0 release. Back then, the tools were unpolished, the APIs in the SDK were unstable, and the documentation was sparse. Fast forward two and a half years, Android is now a formidable mobile operating system, with a following no less impressive that the...

Unconventional Computation: 10th International Conference, UC 2011, Turku, Finland, June 6-10
Unconventional Computation: 10th International Conference, UC 2011, Turku, Finland, June 6-10

The 10th International Conference on Unconventional Computation, UC 2011, was organized under the auspices of EATCS and Academia Europaea, by the Department of Mathematics of the University of Turku (Turku, Finland), and the Center for Discrete Mathematics and Theoretical Computer Science (Auckland, New Zealand). The event was held in...

Location-Based Services Handbook: Applications, Technologies, and Security
Location-Based Services Handbook: Applications, Technologies, and Security

Location-Based Services Handbook: Applications, Technologies, and Security is a comprehensive reference containing all aspects of essential technical information on location-based services (LBS) technology. With broad coverage ranging from basic concepts to research-grade material, it presents a much-needed overview of...

Composing Music with Computers (Music Technology)
Composing Music with Computers (Music Technology)

Focuses on the role of the computer as a generative tool for music composition. Miranda introduces a number of computer music composition techniques ranging from probabilities, formal grammars and fractals, to genetic algorithms, cellular automata and neural computation. Anyone wishing to use the computer as a companion to create music will...

Learning the iOS 4 SDK for JavaScript Programmers: Create Native Apps with Objective-C and Xcode
Learning the iOS 4 SDK for JavaScript Programmers: Create Native Apps with Objective-C and Xcode

You don’t have to be an Apple fanboy or fangirl to give Apple Inc. credit for redefining mobile gadgetry and its surrounding industries. First the company used the iPod to reshape the music industry and strongly influence how we acquire and consume tunes. Just count the number of people wearing iPod-connected earbuds in a subway car....

3G, HSPA and FDD versus TDD Networking: Smart Antennas and Adaptive Modulation
3G, HSPA and FDD versus TDD Networking: Smart Antennas and Adaptive Modulation

3G, HSPA and FDD versus TDD Networking, Second Edition is the only book that contrasts the network capacity gains that may be achieved with the advent of adaptive antenna arrays and HSDPA-style adaptive modulation techniques in the context of FDD and TDD CDMA cellular networks.  In the five years since the first edition of this...

Handbook of Digital Forensics and Investigation
Handbook of Digital Forensics and Investigation

The Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for practitioners in the field.

This unique collection details how to
...

Network and System Security
Network and System Security

Network and System Security provides focused coverage of network and system security technologies. Explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long term challenges in the authors' respective areas of expertise....

Sams Teach Yourself iPad in 10 Minutes (Sams Teach Yourself -- Minutes)
Sams Teach Yourself iPad in 10 Minutes (Sams Teach Yourself -- Minutes)

Sams Teach Yourself iPad™ in 10 Minutes offers straightforward, practical answers when you need fast results. By working through 10-minute lessons, you’ll learn everything you need to use your iPad to get online, get apps, use the Web, manage email, use maps, books, photos, music,...

Fundamentals of Telecommunications
Fundamentals of Telecommunications

Demystifying the technology of telecommunications: a guided tour for the non-engineer

This book provides an easy-to-understand introduction to the complex technical world of telecommunications. From bandwidth to data transfer protocol to PSTN, ISDN, PCS, or ATM-widely respected telecommunications expert and author Roger L.
...

Result Page: 41 40 39 38 37 36 35 34 33 32 31 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy