As highways, crossing points, and urban streets become increasingly jammed with traffic, more and more roadway authorities are turning to electronic tolling and pricing to manage traffic and road usage. This authoritative book offers professionals expert guidance in planning, procuring, and operating electronic tolling and road-user charging...
Peer-to-peer systems are now widely used and have become the focus of attention for many researchers over the past decade. A number of algorithms for decentralized search, content distribution, and media streaming have been developed. This book provides fundamental concepts for the benchmarking of those algorithms in peer-to-peer systems. It...
Fast-moving and ever-changing, stem cell science and research presents ongoing ethical and legal challenges in many countries. Each development and innovation throws up new challenges. This is the case even where new developments initially seem to solve old dilemmas. Sometimes it becomes evident that new science does not in fact solve old...
"This welcome addition to the Linux bookshelf provides real insight into the black-art of debugging. All too often debugging books concentrate solely on the tools but this book avoids that pitfall by concentrating on examples. The authors dissect and discuss each example in detail; in so doing they give invaluable...
As our knowledge of microelectromechanical systems (MEMS) continues to grow, so does The MEMS Handbook. The field has changed so much that this Second Edition is now available in three volumes. Individually, each volume provides focused, authoritative treatment of specific areas of interest. Together, they comprise the most comprehensive collection...
The use of simulation modeling and analysis is becoming increasingly more popular as a technique for improving or investigating process performance. This book is a practical, easy-to-follow reference that offers up-to-date information and step-by-step procedures for conducting simulation studies. It provides sample simulation project support...
Ubiquitous computing names the third wave in computing, where the personal computing
era appears when technology recedes into the background of our lives. The widespread use
of new mobile technology implementing wireless communications such as personal digital
assistants (PDAs) and smart phones enables a new type of advanced...
Traditional well logging methods, such as resistivity, acoustic, nuclear and NMR, provide indirect information related to fluid and formation properties. The “formation tester,” offered in wireline and MWD/LWD operations, is different. It collects actual downhole fluid samples for surface analysis, and through...
This thorough, self-paced guide to Adobe Creative Suite 4 is ideal for users who want to learn the key features of Adobe's stellar collection of professional design tools. Readers are first given a brief program overview of the Design Suite that highlights common features and includes a section on cross-media workflows. Then readers will get up to...
Welcome to MapReduce Design Patterns! This book will be unique in some ways and
familiar in others. First and foremost, this book is obviously about design patterns, which
are templates or general guides to solving problems. We took a look at other design
patterns books that have been written in the past as...
This text is designed for use in introductory research courses in the professional fields and social sciences. The major goal of the book is to acquaint students and beginning researchers with a broad view of research methodologies, as well as an understanding of the assumptions that inform each of these approaches. Because the book presents...
Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data.
In the first part, this book covers the key concepts of cryptography on...