Home | Amazing | Today | Tags | Publishers | Years | Search 
Third Generation Systems and Intelligent Wireless Networking: Smart Antennas and Adaptive Modulation
Third Generation Systems and Intelligent Wireless Networking: Smart Antennas and Adaptive Modulation
Third-Generation Systems and Intelligent Wireless Networking studies the network capacity gains that can be achieved with the advent of adaptive antenna arrays and adaptive modulation techniques in both FDMA / TDMA and CDMA based mobile cellular networks. The employment of adaptive antennas has numerous benefits and advantages. These...
Data Mining Techniques: For Marketing, Sales, and Customer Relationship Management
Data Mining Techniques: For Marketing, Sales, and Customer Relationship Management
The first edition of Data Mining Techniques for Marketing, Sales, and Customer Support appeared on book shelves in 1997. The book actually got its start in 1996 as Gordon and I were developing a 1-day data mining seminar for NationsBank (now Bank of America). Sue Osterfelt, a vice president at NationsBank and the author of a book on database...
Inquiring Organizations: Moving From Knowledge Management To Wisdom
Inquiring Organizations: Moving From Knowledge Management To Wisdom
Inquiring Organizations: Moving from Knowledge Management to Wisdom assembles into one volume a comprehensive collection of the key current thinking regarding the use of C. West Churchman's Design of Inquiring Systems as a basis for computer-based inquiring systems design and implementation. Inquiring systems are systems that go beyond knowledge...
Multicarrier Techniques for 4G Mobile Communications
Multicarrier Techniques for 4G Mobile Communications
At recent major international conferences on wireless communications,
there have been several sessions on beyond third generation (3G) or fourth
generation (4G) mobile communications systems, where modulation/demodulation
and multiplexing/multiple access schemes related to multicarrier
techniques have drawn a lot of attention.
...
Introduction to Java Programming-Comprehensive Version (6th Edition)
Introduction to Java Programming-Comprehensive Version (6th Edition)

Now integrating Java 5 throughout, this reference introduces Java programming fundamentals – including problem-solving, object-oriented programming, GUI programming, data structures, networking, internationalization, advanced GUI programming, and Web programming. Includes many new...

Computer Security in the 21st Century
Computer Security in the 21st Century

Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.

Highlights include...

Fiber-Optic Communication Systems
Fiber-Optic Communication Systems
Since the publication of the first edition of this book in 1992, the state of the art of fiber-optic communication systems has advanced dramatically despite the relatively short period of only 10 years between the first and third editions. For example, the highest capacity of commercial fiber-optic links available in 1992 was only 2.5 Gb/s. A mere...
Formal Syntax and Semantics of Programming Languages: A Laboratory Based Approach
Formal Syntax and Semantics of Programming Languages: A Laboratory Based Approach
This text developed out of our experiences teaching courses covering the formal semantics of programming languages. Independently we both developed laboratory exercises implementing small programming languages in Prolog following denotational definitions. Prolog proved to be an excellent tool for illustrating the formal semantics of programming...
The Definitive Guide to db4o
The Definitive Guide to db4o

To satisfy the demand for 24/7 information access, applications available in airport and conference kiosks, and in the mobile, gaming, and medical industries, provide consumers data access wherever they are. But it's essential that fast availability not be traded for quality performance.

A prominent solution for managing the data in...

Skype For Dummies (Computer/Tech)
Skype For Dummies (Computer/Tech)
See how to use Skype for secure chats and connect SkypeOut and SkypeIN. Here's the fun and easy way (r) to understand all the hype about Skype and make this cool alternative communication system work for you! You'll get great advice about hardware, directions for downloading and installing Skype, ideas for using Skype in your business, and the...
Spoken Language Processing: A Guide to Theory, Algorithm and System Development
Spoken Language Processing: A Guide to Theory, Algorithm and System Development
Our primary motivation in writing this book is to share our working experience to bridge the gap between the knowledge of industry gurus and newcomers to the spoken language processing community. Many powerful techniques hide in conference proceedings and academic papers for years before becoming widely recognized by the research community or the...
Data Mining: Theory, Methodology, Techniques, and Applications (Lecture Notes in Computer Science)
Data Mining: Theory, Methodology, Techniques, and Applications (Lecture Notes in Computer Science)
Data mining has been an area of considerable research and application in Australia and the region for many years. This has resulted in the establishment of a strong tradition of academic and industry scholarship, blended with the pragmatics of practice in the field of data mining and analytics. ID3, See5, RuleQuest.com, MagnumOpus, and WEKA is but...
Result Page: 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy