Home | Amazing | Today | Tags | Publishers | Years | Search 
Transactions on Data Hiding and Multimedia Security II (Lecture Notes in Computer Science)
Transactions on Data Hiding and Multimedia Security II (Lecture Notes in Computer Science)
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to...
Traffic Grooming for Optical Networks: Foundations, Techniques and Frontiers (Optical Networks)
Traffic Grooming for Optical Networks: Foundations, Techniques and Frontiers (Optical Networks)
Traffic grooming is the name given to a family of optical network design problems that has attracted significant attention from both academia and industry in the last decade or so. The huge bandwidth of fiber optical networking is much larger than the typical bandwidth demands experienced by network service providers. This mismatch creates a need...
Mathematical Principles of Optical Fiber Communication (CBMS-NSF Regional Conference Series in Applied Mathematics)
Mathematical Principles of Optical Fiber Communication (CBMS-NSF Regional Conference Series in Applied Mathematics)
With the maturing of mobile portable telephony and the emerging broadband access market, greater fiber transmission capacity will be essential in the early 21st century. Since the demand for more capacity drives the development of new optics-based technologies, fiber optics therefore remains a vibrant area for research. Mathematical Principles of...
Microcontroller Projects in C for the 8051
Microcontroller Projects in C for the 8051
This book is a thoroughly practical way to explore the 8051 and discover C programming through project work. Through graded projects, Dogan Ibrahim introduces the reader to the fundamentals of microelectronics, the 8051 family, programming in C, and the use of a C compiler. The specific device used for examples is the AT89C2051 - a small,...
Dojo: The Definitive Guide
Dojo: The Definitive Guide
Of all the Ajax-specific frameworks that have popped up in recent years, one clearly stands out as the industrial strength solution. Dojo is not just another JavaScript toolkit -- it's the JavaScript toolkit -- and Dojo: The Definitive Guide demonstrates how to tame Dojo's extensive library of utilities so that you can build rich and responsive web...
Hybrid Learning and Education: First International Conference, ICHL 2008 Hong Kong, China, August 13-15, 2008 Proceedings
Hybrid Learning and Education: First International Conference, ICHL 2008 Hong Kong, China, August 13-15, 2008 Proceedings
The First International Conference on Hybrid Learning was organized by City University of Hong Kong, Caritas Francis Hsu College and Caritas Bianchi College of Careers in August 2008. ICHL2008 was an innovative and consolidative experience for Hong Kong tertiary higher education. The conference aims to unify the traditional classroom face-to-face...
Mobile Agents: Basic Concepts, Mobility Models, and the Tracy Toolkit
Mobile Agents: Basic Concepts, Mobility Models, and the Tracy Toolkit
"I think this book will be the first standard introductory book on mobile agents." José M. Vidal, University of South Carolina
Mobile agents are software nomads that act as your personal representative, working autonomously through networks. They are able to visit network nodes directly using available computing power and are
...
Programming .NET 3.5
Programming .NET 3.5

.NET 3.5 will help you create better Windows applications, build Web Services that are more powerful, implement new Workflow projects and dramatically enhance the user's experience. But it does so with what appears to be a collection of disparate technologies. In Programming .NET 3.5, bestselling...

Space Time Coding for Broadband Wireless Communications
Space Time Coding for Broadband Wireless Communications
This is the first book on space-time coding for wireless communications, one of the most promising techniques for ensuring bandwidth efficiency. The text describes theoretical principles as well as engineering applications; discusses key criteria in the design of practical space-time codes; and covers single-carrier and multi-carrier transmission...
Active Java: Object-Oriented Programming for the World Wide Web
Active Java: Object-Oriented Programming for the World Wide Web
The past four years have seen a phenomenal rise in interest in the Internet. Tens of millions of users regularly access this network to carry out operations such as browsing through electronic newspapers, downloading bibliographies, participating in news groups and emailing friends and colleagues. The number of applications that are hosted within...
The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems (Wireless Networks and Mobile Communications)
The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems (Wireless Networks and Mobile Communications)
Ubiquitous and pervasive technologies such as RFID and smart computing promise a world of networked and interconnected devices. Everything from tires to toothbrushes could soon be in communications range, heralding the dawn of an era in which today's Internet of People gives way to tomorrow's Internet of Things where billions of...
E-Learning Methodologies and Computer Applications in Archaeology
E-Learning Methodologies and Computer Applications in Archaeology
Tools of data comparison and analysis are critical in the field of archaeology, and the integration of technological advancements such as geographic information systems, intelligent systems, and virtual reality reconstructions with the teaching of archaeology is crucial to the effective utilization of resources in the field.

E-Learning...

Result Page: 182 181 180 179 178 177 176 175 174 173 172 171 170 169 168 167 166 165 164 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy