Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Quantum Computing and Communications: An Engineering Approach
Quantum Computing and Communications: An Engineering Approach
Quantum computers will revolutionize the way telecommunications networks function.

Quantum computing holds the promise of solving problems that would be intractable with conventional computers, by implementing principles from quantum physics in the development of computer hardware, software and communications equipment....

Big Data Visualization
Big Data Visualization
Learn effective tools and techniques to separate big data into manageable and logical components for efficient data visualization About This Book This unique guide teaches you how to visualize your cluttered, huge amounts of big data with ease It is rich with ample options and solid use cases for big data visualization, and is a must-have book...
Advanced Data Mining Techniques
Advanced Data Mining Techniques
This book covers the fundamental concepts of data mining, to demonstrate the potential of gathering large sets of data, and analyzing these data sets to gain useful business understanding. The book is organized in three parts. Part I introduces concepts. Part II describes and demonstrates basic data mining algorithms. It also contains chapters on a...
Mobile Database Systems (Wiley Series on Parallel and Distributed Computing)
Mobile Database Systems (Wiley Series on Parallel and Distributed Computing)
A breakthrough sourcebook to the challenges and solutions for mobile database systems

This text enables readers to effectively manage mobile database systems (MDS) and data dissemination via wireless channels. The author explores the mobile communication platform and analyzes its use in the development of a distributed database management...

Unconstrained Face Recognition (International Series on Biometrics)
Unconstrained Face Recognition (International Series on Biometrics)
Face recognition has been actively studied over the past decade and continues to be a big research challenge. Just recently, researchers have begun to investigate face recognition under unconstrained conditions. Unconstrained Face Recognition provides a comprehensive review of this biometric, especially face recognition from video, assembling a...
Mission-Critical Network Planning
Mission-Critical Network Planning
I wrote this book in the aftermath of the terrorist attacks that took place on September
11, 2001. Until then, I was planning to write this book at a much later time. But
the events of that day compelled me to immediately begin this work. As we have
seen, those events have had far-reaching repercussions in the information
...
AD HOC NETWORKS: Technologies and Protocols
AD HOC NETWORKS: Technologies and Protocols
Wireless mobile networks and devices are becoming increasingly popular as
they provide users access to information and communication anytime and anywhere.
Conventional wireless mobile communications are usually supported
by a wired fixed infrastructure. A mobile device would use a single-hop wireless
radio communication to
...
Analysis and Control of Boolean Networks: A Semi-tensor Product Approach
Analysis and Control of Boolean Networks: A Semi-tensor Product Approach

Analysis and Control of Boolean Networks presents a systematic new approach to the investigation of Boolean control networks. The fundamental tool in this approach is a novel matrix product called the semi-tensor product (STP). Using the STP, a logical function can be expressed as a conventional discrete-time linear system. In the light of...

Source Code China: The New Global Hub of IT (Information Technology) Outsourcing
Source Code China: The New Global Hub of IT (Information Technology) Outsourcing
Source Code China

The New Global Hub of IT Outsourcing

Welcome to the new technology outsourcing services industry reality: China!

The factors that point to a country's potential and success as an outsourcing destination inevitably lead to the one country that is rapidly becoming the new hub for IT...

Dry Eye and Ocular Surface Disorders
Dry Eye and Ocular Surface Disorders

In addition to communicating current methods for diagnosis and assessing the array of conventional and newfound therapeutic options for dry eye and ocular surface disorders, this edifying reference offers scientific background on normal ocular surface and tear film functioning; descriptions of the mechanisms involved in inflammation; and a...

Handbook of Research on Virtual Workplaces and the New Nature of Business Practices
Handbook of Research on Virtual Workplaces and the New Nature of Business Practices
At one time, the office was a physical place, and employees congregated in the same location to work together on projects. The advent of the Internet and the World Wide Web, however, not only made the unthinkable possible, it forever changed the way persons view both the office and work. The Handbook of Research on Virtual Workplaces and the New...
Design Methods and Applications for Distributed Embedded Systems
Design Methods and Applications for Distributed Embedded Systems

The ever decreasing price/performance ratio of microcontrollers makes it economically attractive to replace more and more conventional mechanical or electronic control systems within many products by embedded real-time computer systems. An embedded real-time computer system is always part of a well-specified larger system, which we call an...

unlimited object storage image
Result Page: 42 41 40 39 38 37 36 35 34 33 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy