Home | Amazing | Today | Tags | Publishers | Years | Search 
Innovative Tools for Business Coalitions in B2B Applications
Innovative Tools for Business Coalitions in B2B Applications

One of the most debated consequences regarding the increased availability and use of information and communication technologies (ICTs), especially since the early 1990s, have been their impact on economic growth. Generally speaking, ICT can serve to reduce transaction costs at all levels of a commercial transaction. With the emergence...

Understanding Voice Over IP Technology
Understanding Voice Over IP Technology

The technology of voice over IP provides for making telephone calls over data networks such as the Internet and it has now reached critical mass. I know this because as a technology instructor I spend more and more time teaching Voice over IP or “VoIP.” I wrote this book because I couldn’t find any material suitable...

The HCS12 / 9S12: An Introduction to Software and Hardware Interfacing
The HCS12 / 9S12: An Introduction to Software and Hardware Interfacing

The Freescale HCS12 (also known as 9S12) microcontroller family was initially designed for automotive applications. The design of the HCS12 combines most features common in major 8-bit and 16-bit microcontrollers.

1. Full-feature timer system. The HCS12 timer system provides input-capture, outputcompare, pulse-width...

Microsoft Windows 7: Comprehensive (Shelly Cashman)
Microsoft Windows 7: Comprehensive (Shelly Cashman)

The Shelly Cashman Series® offers the fi nest textbooks in computer education. We are proud of the fact that our Microsoft Windows 3.1, Microsoft Windows 95, Microsoft Windows 98, Microsoft Windows 2000, Microsoft Windows XP, and Microsoft Windows Vista books have been so well received by students and instructors. With each new...

JavaScript Web Applications
JavaScript Web Applications

JavaScript has come a long way from its humble beginnings in 1995 as part of the Netscape browser, to the high-performance JIT interpreters of today. Even just five years ago developers were blown away by Ajax and the yellow fade technique; now, complex JavaScript apps run into the hundreds of thousands of lines.

In the last year,...

Representation and Inference for Natural Language: A First Course in Computational Semantics
Representation and Inference for Natural Language: A First Course in Computational Semantics

This book developed out of courses on computational semantics that the authors jointly taught at the Department of Computational Linguistics, University of the Saarland, Saarbrucken, Germany, in 1995 and 1998, and at ESSLLI'97, the 9th European Summer School in Logic, Language and Information, Aix-en-Provence, France, in...

Video Segmentation and Its Applications
Video Segmentation and Its Applications

Video segmentation has been a key technique for visual information extraction and plays an important role in digital video processing, pattern recognition, and computer vision. A wide range of video-based applications will benefit from advances in video segmentation including security and surveillance, bank transactions monitoring,...

VMware vSphere 5 Clustering Technical Deepdive
VMware vSphere 5 Clustering Technical Deepdive

** Black & White edition ** VMware vSphere 5 Clustering Technical Deepdive zooms in on three key components of every VMware based infrastructure and is by no means a "how to" guide. It covers the basic steps needed to create a vSphere HA and vSphere DRS cluster and to implement vSphere Storage DRS. Even more important, it...

Utility-Based Learning from Data
Utility-Based Learning from Data

Statistical learning — that is, learning from data — and, in particular, probabilistic model learning have become increasingly important in recent years. Advances in information technology have facilitated an explosion of available data. This explosion has been accompanied by theoretical advances, permitting new and...

Java How to Program (early objects) (9th Edition) (Deitel)
Java How to Program (early objects) (9th Edition) (Deitel)

Welcome to Java and Java How to Program, Ninth Edition! This book presents leadingedge computing technologies for students, instructors and software developers.

The new Chapter 1 engages students with intriguing facts and figures to get them excited about studying computers and programming. The chapter includes a table of some of...

Cryptography and Network Security: Principles and Practice (5th Edition)
Cryptography and Network Security: Principles and Practice (5th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

C++ How to Program (8th Edition)
C++ How to Program (8th Edition)

Welcome to the C++ computer programming language and C++ How to Program, Eighth Edition! This book presents leading-edge computing technologies, and is particularly appropriate for inroductory course sequences based on the curriculum recommendations of two key professional organizations—the ACM and the IEEE.

The new...

Result Page: 810 809 808 807 806 805 804 803 802 801 800 799 798 797 796 795 794 793 792 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy