Home | Amazing | Today | Tags | Publishers | Years | Search 
Deadline Scheduling for Real-Time Systems - EDF and Related Algorithms
Deadline Scheduling for Real-Time Systems - EDF and Related Algorithms
Many real-time systems rely on static scheduling algorithms. This includes cyclic scheduling, rate monotonic scheduling and fixed schedules created by off-line scheduling techniques such as dynamic programming, heuristic search, and simulated annealing. However, for many real-time systems, static scheduling algorithms are quite restrictive and...
Brands That Rock: What Business Leaders Can Learn from the World of Rock and Roll
Brands That Rock: What Business Leaders Can Learn from the World of Rock and Roll
"Reading Brands That Rock is like attending business school, where classes on customer loyalty, consumer behavior, and branding are taught by Mick Jagger, Elton John, Steven Tyler, and Madonna."

–Tommy Hilfiger, Designer

Cadillac and The Rolling Stones. Victoria’s Secret and Madonna. Wal-Mart and...

Thinking in Java (4th Edition)
Thinking in Java (4th Edition)

Thinking in Java has earned raves from programmers worldwide for its extraordinary clarity, careful organization, and small, direct programming examples. From the fundamentals of Java syntax to its most advanced features, Thinking in Java is designed to teach, one simple step at a time.

...
Essential MATLAB for Scientists and Engineers
Essential MATLAB for Scientists and Engineers
Based on a teach-yourself approach, the fundamentals of MATLAB are illustrated throughout with many examples from a number of different scientific and engineering areas, such as simulation, population modelling, and numerical methods, as well as from business and everyday life. Some of the examples draw on first-year university level maths, but...
Handbook of Multisensor Data Fusion: Theory and Practice, Second Edition (Electrical Engineering and Applied Signal Processing)
Handbook of Multisensor Data Fusion: Theory and Practice, Second Edition (Electrical Engineering and Applied Signal Processing)
In the years since the bestselling first edition, fusion research and applications have adapted to service-oriented architectures and pushed the boundaries of situational modeling in human behavior, expanding into fields such as chemical and biological sensing, crisis management, and intelligent buildings.

Handbook of Multisensor Data...

After Effects Expressions
After Effects Expressions
Expressions are tools. Just as you use the Rotation tool and the Pen tool, you can use Expressions to control animation and composition in After Effects (AE).

Whereas you use most tools by clicking on their icons (e.g., the pointer or the pen) and clicking or dragging with the mouse, you use Expressions by typing commands on the
...
JUNOS For Dummies (Computer/Tech)
JUNOS For Dummies (Computer/Tech)
If you’re in charge of a network, you’re probably aware that the only time anyone notices the network is when it goes down. With JUNOS software and JUNOS For Dummies, a friendly book to help you set it up and manage the software, you might be able to start convincing your clients to believe in magic. Here’s the help you...
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The techniques discussed show readers how to perform their own evaluation of new and emerging security...
Cisco Routers for the Small Business: A Practical Guide for IT Professionals (Expert's Voice in Cisco)
Cisco Routers for the Small Business: A Practical Guide for IT Professionals (Expert's Voice in Cisco)
Cisco Routers for the Small Business provides in plain English a no–nonsense approach to setting up all the features of the Cisco IOS for a small business using broadband technologies. This book explains how to use a Cisco router to setup cable modems, DSL and PPPoE, and explains how to configure NAT, Access Control Lists, Firewalls,...
Data Preparation for Data Mining (The Morgan Kaufmann Series in Data Management Systems)
Data Preparation for Data Mining (The Morgan Kaufmann Series in Data Management Systems)
Data Preparation for Data Mining addresses an issue unfortunately ignored by most authorities on data mining: data preparation. Thanks largely to its perceived difficulty, data preparation has traditionally taken a backseat to the more alluring question of how best to extract meaningful knowledge. But without adequate preparation of your...
Expert Shell Scripting (Expert's Voice in Open Source)
Expert Shell Scripting (Expert's Voice in Open Source)

I learned the basics of programming when I was in school; I learned how to shell-script by example.

I’ve met and worked with many system administrators and other *NIX folks, each of whom has their own bag of tricks when it comes to managing a system, interacting with their environment, or coding a script. It’s
...

Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions

Lock down next-generation Web services

"This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, Facebook

...

Result Page: 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy