Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Telecosmos: The Next Great Telecom Revolution
Telecosmos: The Next Great Telecom Revolution
An insider's guide to the exciting future of telecommunications

The last great telecommunications revolution brought us fiber optics, mobile phones, videoconferencing, and a host of other innovations that improved life and business and connected individuals in ways never imagined. Now emerging technologies such as Voice over Internet Protocol...

Use Cases: Requirements in Context, Second Edition
Use Cases: Requirements in Context, Second Edition

This book describes how to gather and define software requirements using a process based on use cases. It shows systems analysts and designers how use cases can provide solutions to the most challenging requirements issues, resulting in effective, quality systems that meet the needs of users.

Use Cases, Second Edition:...

Human-Centered Software Engineering - Integrating Usability in the Software Development Lifecycle
Human-Centered Software Engineering - Integrating Usability in the Software Development Lifecycle

The fields of HCI and Software Engineering have evolved almost independently of each other until the last decade, when it became apparent that an integrated and combined perspective would benefit the development of interactive software applications. The chapters in this book are written by prominent researchers who bring to light the major...

Coding and Cryptology: Proceedings of the International Workshop, Wuyi Mountain, Fujian, China, 11-15 June 2007
Coding and Cryptology: Proceedings of the International Workshop, Wuyi Mountain, Fujian, China, 11-15 June 2007
The rst International Workshop on Coding and Cryptology was held in Wuyi Mountain, Fujian, China, June 11 - 15, 2007. The workshop was organised by Fujian Normal University, China and Nanyang Technological University, Singapore. We acknowledge with gratitude the nancial support from the Key Laboratory of Network Security and Cryptology, Fujian...
Software Language Engineering: Third International Conference, SLE 2010
Software Language Engineering: Third International Conference, SLE 2010

We are pleased to present the proceedings of the third international conference on Software Language Engineering (SLE 2010). The conference was held in Eindhoven, the Netherlands during October 12–13, 2010. It was co-located with the ninth international conference on Generative Programming and Component Engineering (GPCE) and the...

The Coming Robot Revolution: Expectations and Fears About Emerging Intelligent, Humanlike Machines
The Coming Robot Revolution: Expectations and Fears About Emerging Intelligent, Humanlike Machines

Making a robot that looks and behaves like a human being has been the subject of many popular science fiction movies and books. Although the development of such a robot faces many challenges, the making of a virtual human has long been potentially possible. With recent advances in various key technologies related to hardware and...

JavaScript Domain-Driven Design
JavaScript Domain-Driven Design

Speed up your application development by leveraging the patterns of domain-driven design

About This Book

  • Understand the complexity of your business requirements to develop more productive applications
  • Combine modern development techniques with traditional methods and create new...
Dynamic Secrets in Communication Security
Dynamic Secrets in Communication Security

Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in...

Bluetooth For Java
Bluetooth For Java
Bluetooth is a technology for wireless communication. It is similar in functionality to the way laptops connect to the
Internet from home/office, but is typically used for short burst communications instead of a continuous connection.
Because of this difference, Bluetooth is more typically found supported in wireless phones and personal
...
Extreme Programming for Web Projects
Extreme Programming for Web Projects

Web development teams have been operating in the dark for far too long. The lack of proven development methodologies for the Web environment has resulted in a constant struggle for developers to produce quality Web-based projects on time and within budget. The field is multidisciplinary in character, involving both technology and...

Engineering Societies in the Agents World IV: 4th International Workshop, ESAW 2003, London, UK, October 29-31, 2003, Revised Selected and Invited Papers
Engineering Societies in the Agents World IV: 4th International Workshop, ESAW 2003, London, UK, October 29-31, 2003, Revised Selected and Invited Papers
This book constitutes the thoroughly refereed post-proceedings of the 4th International Workshop on Engineering Societies in the Agents World, ESAW 2004, held in London, UK in October 2004. The 23 revised full papers presented were carefully selected during two rounds of reviewing and improvement for inclusion in the book; also included are 2...
Awareness Systems: Advances in Theory, Methodology and Design (Human-Computer Interaction Series)
Awareness Systems: Advances in Theory, Methodology and Design (Human-Computer Interaction Series)

People go about their daily tasks with an in-built awareness of their social and physical environments. This awareness helps them to work cooperatively in groups, coordinate actions, and to maintain and enhance social communication with others. Networked technology has extended the reach of people's awareness to remote and distributed groups and...

unlimited object storage image
Result Page: 178 177 176 175 174 173 172 171 170 169 168 167 166 165 164 163 162 161 160 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy