Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
DNA Computing: 12th International Meeting on DNA Computing, DNA12, Seoul, Korea, June 5-9, 2006
DNA Computing: 12th International Meeting on DNA Computing, DNA12, Seoul, Korea, June 5-9, 2006
This book constitutes the thoroughly refereed postproceedings of the 11th International Workshop on DNA Based Computers, DNA11, held in London, ON, Canada, in June 2005.

The 34 revised full papers presented were carefully selected during two rounds of reviewing and improvement from an initial total of 79 submissions. The wide-ranging topics...

Linear and Nonlinear Multivariable Feedback Control: A Classical Approach
Linear and Nonlinear Multivariable Feedback Control: A Classical Approach

Automatic feedback control systems play crucial roles in many fields, including manufacturing industries, communications, naval and space systems. At its simplest, a control system represents a feedback loop in which the difference between the ideal (input) and actual (output) signals is used to modify the behaviour of the system. Control...

Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)
Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)

This book is an outstanding contribution to the interdisciplinary series on Crime, Media, and Popular Culture from Praeger Publishers. Because of the pervasiveness of media in our lives and the salience of crime and criminal justice issues, we feel it is especially important to provide a home for scholars who are engaged in innovative and...

Exam Ref 70-687 Configuring Windows 8.1 (MCSA)
Exam Ref 70-687 Configuring Windows 8.1 (MCSA)

Fully updated for Windows 8.1! Prepare for Microsoft Exam 70-687 - and help demonstrate your real-world mastery of configuring Windows 8.1 in the enterprise. Designed for experienced IT professionals ready to advance their status, Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the MCSA or MCSE...

Building Intelligent .NET Applications: Agents, Data Mining, Rule-Based Systems, and Speech Processing
Building Intelligent .NET Applications: Agents, Data Mining, Rule-Based Systems, and Speech Processing

Artificial intelligence (AI) has been in existence almost as long as computers. However, only recently have AI techniques been widely incorporated by companies to enhance

traditional business applications.

Building Intelligent .NET Applications is...

Learning Java (The Java Series)
Learning Java (The Java Series)

This book is about the Java™ language and programming environment. If you've been at all active on the Internet in the past few years, you've heard a lot about Java. It's one of the most exciting developments in the history of the Internet, rivaling the creation of the World Wide Web. Java became the darling of the Internet programming...

Declarative Programming for Knowledge Management: 16th International Conference on Applications of Declarative Programming and Knowledge Management, INAP
Declarative Programming for Knowledge Management: 16th International Conference on Applications of Declarative Programming and Knowledge Management, INAP
Knowledge means power – but only if it is available at the right time, the right place, and in the hands of the right people. Structured, engineered, repeatable methods to gather, transport, and apply knowledge are collectively called knowledge management.

Declarative programming strives for the ideal of programming by wish: the
...
iPad All-in-One For Dummies
iPad All-in-One For Dummies

Slate-style computers have been around for a few years, but it took Apple to make them catch on with the general public in a big way when it introduced the iPad. This small, less than a pound-and-a-half wonder has sold millions of units in its first year for good reason: It’s well designed, feature rich, and opens up a world of...

Home Networking Do-It-Yourself For Dummies
Home Networking Do-It-Yourself For Dummies

Fifty years ago, most households had only one television and one telephone. As the price of these technological marvels dropped, families began purchasing additional televisions and telephones — and the home network was born!

Think about it: Your televisions are basically networked together on a cable network. Okay, not a...

Designing for Small Screens: Mobile Phones, Smart Phones, PDAs, Pocket PCs, Navigation Systems, MP3 Players, Game Consoles
Designing for Small Screens: Mobile Phones, Smart Phones, PDAs, Pocket PCs, Navigation Systems, MP3 Players, Game Consoles

The design of interactive applications or presentations on small screens can be challenging for the designer. Not all design concepts that are valid on larger screens can be implemented on the small screen. A multitude of different devices with dissimilar technical specifications fall under the category of small- screen interfaces. Devices in...

Expanding Your Raspberry Pi: Storage, printing, peripherals, and network connections for your Raspberry Pi
Expanding Your Raspberry Pi: Storage, printing, peripherals, and network connections for your Raspberry Pi
Gain a deeper understanding of how Raspberry Pi works to get the results you want right in the palm of your hand. This book helps you understand the right connections and software to drive your Raspberry Pi into opening the worlds of programming, electronic experiments, system control, digital imaging, and the Internet of Things to you. ...
Security and Usability: Designing Secure Systems That People Can Use
Security and Usability: Designing Secure Systems That People Can Use

Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them.

...
unlimited object storage image
Result Page: 150 149 148 147 146 145 144 143 142 141 140 139 138 137 136 135 134 133 132 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy