Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computational Intelligence in Reliability Engineering (Studies in Computational Intelligence)
Computational Intelligence in Reliability Engineering (Studies in Computational Intelligence)
This two-volume book covers the recent applications of computational intelligence techniques in reliability engineering. Research in the area of computational intelligence is growing rapidly due to the many successful applications of these new techniques in very diverse problems. “Computational Intelligence” covers many fields such as...
Distributed and Parallel Systems: From Cluster to Grid Computing
Distributed and Parallel Systems: From Cluster to Grid Computing
The sixthAustrian-HungarianWorkshop onDistributed and Parallel Systems is organized jointly byUniversity of Innsbruck and theMTASZTAKIComputer and Automation Research Institute. The series of workshops started as a small regional meeting early in the nineties, and since then it evolved a lot and became an acknowledged international scientific...
Mac OS X Panther for Unix Geeks
Mac OS X Panther for Unix Geeks
With its rep for being the sort of machine that won't intimidate even the most inexperienced users, what's the appeal of the Mac® for hard-core geeks? The Mac has always been an efficient tool, pleasant to use and customize, and eminently hackable. But now with Mac OS® X's BSD core, many a Unix® developer has found it irresistible. The...
RFID Explained (Synthesis Lectures on Mobile and Pervasive Computing)
RFID Explained (Synthesis Lectures on Mobile and Pervasive Computing)
This lecture provides an introduction to Radio Frequency Identification (RFID), a technology enabling automatic identification of objects at a distance without requiring line-of-sight. Electronic tagging can be divided into technologies that have a power source (active tags), and those that are powered by the tag interrogation signal (passive...
Advances in Evolutionary Computing for System Design (Studies in Computational Intelligence)
Advances in Evolutionary Computing for System Design (Studies in Computational Intelligence)
Evolutionary computing paradigms offer robust and powerful adaptive search mechanisms for system design. This book includes thirteen chapters covering a wide area of topics in evolutionary computing and applications including: Introduction to evolutionary computing in system design; evolutionary neuro-fuzzy systems; evolution of fuzzy controllers;...
From Grids To Service and Pervasive Computing
From Grids To Service and Pervasive Computing
Grids are a crucial enabling technology for scientific and industrial development. Peer-to-peer computing, grid, distributed storage technologies, emerging web service technologies, and other types of networked distributed computing have provided new paradigms exploiting distributed resources. Grids are revolutionizing computing as profoundly as...
3-D Shape Estimation and Image Restoration: Exploiting Defocus and Motion-Blur
3-D Shape Estimation and Image Restoration: Exploiting Defocus and Motion-Blur
"This book presents a framework for estimating three-dimensional (3D) shapes from defocused and motion-blurred images. The book systematically describes various problems involved in estimating 3D shapes, and provides solutions to these problems… The book is well-written, and is equipped with Matlab code that implements the estimators...
Numerical Methods for Least Squares Problems
Numerical Methods for Least Squares Problems
The method of least squares was discovered by Gauss in 1795. It has since become the principal tool for reducing the influence of errors when fitting models to given observations. Today, applications of least squares arise in a great number of scientific areas, such as statistics, geodetics, signal processing, and control.

In the last 20 years...

Autonomic Communication
Autonomic Communication

New paradigms for communication/networking systems are needed in order to tackle such emerging issues as heterogeneity, complexity and management of evolvable infrastructures, thus requiring approaches that are both task- and knowledge-driven. The networking and seamless integration of concepts, technologies and devices in a dynamically changing...

Security in Ad-hoc and Sensor Networks (Computer and Network Security)
Security in Ad-hoc and Sensor Networks (Computer and Network Security)

Ad hoc and sensor networks continue to have a growing impact on communication. These cost-effective wireless networks provide location independent computing in environments ranging from military battlefields to in-home patient monitoring systems. However, having real-time connectivity to critical information over an open...

APIs: A Strategy Guide
APIs: A Strategy Guide
APIs are a big deal and they are getting bigger. Pioneering companies such as Google, Facebook, Apple, and Twitter have exposed amazing technological solutions to the public, transforming existing businesses and creating new industries. Central to these companies’ successes are the APIs that link people and...
Beginning Mobile Application Development in the Cloud (Wrox Programmer to Programmer)
Beginning Mobile Application Development in the Cloud (Wrox Programmer to Programmer)
YOU CAN BUILD HIGH-QUALITY MOBILE APPS using only HTML, CSS, and JavaScript. And you can use JavaScript to build the cloud services that support those apps. You don’t need to learn Objective-C or Java to deliver production-quality iPhone and Android mobile apps.

This book shows you how to use the web development
...
unlimited object storage image
Result Page: 210 209 208 207 206 205 204 203 202 201 200 199 198 197 196 195 194 193 192 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy