Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
LANs to WANs: The Complete Management Guide
LANs to WANs: The Complete Management Guide
This text addresses key network management challenges, showing professionals how to tie together incompatible LANs, meld legacy systems and LANs, extend the reach of LANs with wireless links, and protect information assets from various disaster scenarios.

Empowered by today’s high-performance computers interconnected over LANs and...

Engineering the Complex SOC: Fast, Flexible Design with Configurable Processors
Engineering the Complex SOC: Fast, Flexible Design with Configurable Processors

Engineering the Complex SOC The first unified hardware/software guide to processor-centric SOC design Processor-centric approaches enable SOC designers to complete far larger projects in far less time. Engineering the Complex SOCis a comprehensive, example-driven guide to creating designs with configurable, extensible processors. Drawing upon...

Java in a Nutshell, Fourth Edition
Java in a Nutshell, Fourth Edition

Java just keeps growing, adding features, functionality, complexity, and tempting developers to growl with frustration. The new 1.4 release of Java 2 Standard edition increases the size of the platform by 50%, to 2757 classes in 135 packages. How are you going to figure out what this means for your applications? As always, Java in...

Expert One-on-One J2EE Design and Development (Programmer to Programmer)
Expert One-on-One J2EE Design and Development (Programmer to Programmer)

The results of using J2EE in practice are often disappointing—applications are often slow, unduly complex, and take too long to develop. The author believes that the problem lies not in J2EE itself, but that it is often used badly. Many J2EE publications advocate approaches that, while fine in theory, often fail in reality, or deliver no...

Dreamweaver MX 2004: The Missing Manual
Dreamweaver MX 2004: The Missing Manual
Dreamweaver MX 2004: The Missing Manual enables both first-time and experienced web designers to bring stunning, interactive web sites to life. What sets this new edition apart is the crystal-clear writing, welcome humor, and exclusive features. With over 500 illustrations, a handcrafted index, and the clarity...
Verification of Sequential and Concurrent Programs (Texts in Computer Science)
Verification of Sequential and Concurrent Programs (Texts in Computer Science)

This widely anticipated third edition provides a systematic exploration of one of the most common approaches to program verification, known as the assertional approach. This approach is applied to deterministic and nondeterministic sequential programs of varying complexity, together with both parallel and distributed concurrent programs. The...

VHDL : Programming By Example
VHDL : Programming By Example
THE HANDS-DOWN FAVORITE USER'S GUIDE TO VHDLCOMPLETELY UPDATED TO REFLECT THE VERY LATEST DESIGN METHODS

CD-ROM WITH WORKING CODE EXAMPLES, VERIFICATION TOOLS AND MORE

No matter what your current level of expertise, nothing will have you writing and verifying concise, efficient VHDL descriptions of...

Pro Javascript RIA Techniques: Best Practices, Performance and Presentation
Pro Javascript RIA Techniques: Best Practices, Performance and Presentation
Pro JavaScript RIA Techniques: Best Practices, Performance, and Presentation shows you how you can build JavaScript RIAs (Rich Internet Applications) with compelling user interfaces and great performance.

With the best practices and optimization techniques you’ll learn in this book, you can optimize performance without...

Test-Driven Development: An Empirical Evaluation of Agile Practice
Test-Driven Development: An Empirical Evaluation of Agile Practice

Agile methods are gaining more and more interest both in industry and in research. Many industries are transforming their way of working from traditional waterfall projects with long duration to more incremental, iterative and agile practices. At the same time, the need to evaluate and to obtain evidence for different processes, methods and...

Mathematical and Statistical Methods for Multistatic Imaging (Lecture Notes in Mathematics)
Mathematical and Statistical Methods for Multistatic Imaging (Lecture Notes in Mathematics)

This book covers recent mathematical, numerical, and statistical approaches for multistatic imaging of targets with waves at single or multiple frequencies. The waves can be acoustic, elastic or electromagnetic. They are generated by point sources on a transmitter array and measured on a receiver array. An important problem in multistatic...

Black-Box Models of Computation in Cryptology
Black-Box Models of Computation in Cryptology

Generic group algorithms solve computational problems defined over algebraic groups without exploiting properties of a particular representation of group elements. This is modeled by treating the group as a black-box. The fact that a computational problem cannot be solved by a reasonably restricted class of algorithms may be seen as support...

Towards a New Evolutionary Computation: Advances on Estimation of Distribution Algorithms
Towards a New Evolutionary Computation: Advances on Estimation of Distribution Algorithms
Estimation of Distribution Algorithms (EDAs) are a set of algorithms in the Evolutionary Computation (EC) field characterized by the use of explicit probability distributions in optimization. Contrarily to other EC techniques such as the broadly known Genetic Algorithms (GAs) in EDAs, the crossover and mutation operators are substituted by the...
unlimited object storage image
Result Page: 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy