 |
|
 DSLs in Action
Your success—and sanity—are closer at hand when you work at a higher level of abstraction, allowing your attention to be on the business problem rather than the details of the programming platform. Domain Specific Languages -- “little languages” implemented on top of conventional programming languages -- give... |  |  ULSI Technology
ULSI Technology describes the theoretical and practical aspects of the most advanced state of electronics technology-ultralarge-scale integration (ULSI), where an integrated circuit (IC) chip contains over 10 million semiconductor devices. With ULSI technology, the cost of electronics products will decrease while the system functionality and... |  |  Dictionary of Aviation: Over 5,500 Terms Clearly Defined
This revised edition contains over 5,500 terms.
English is the universal language of communication used in civil aviation. This dictionary provides the basic vocabulary of terms used by pilots, cabin staff, maintenance crews, ground staff and travellers worldwide. The terms are those used in everyday ... |
|
 RF and Microwave Passive and Active Technologies
In the high frequency world, the passive technologies required to realize RF and microwave functionality present distinctive challenges. SAW filters, dielectric resonators, MEMS, and waveguide do not have counterparts in the low frequency or digital environment. Even when conventional lumped components can be used in high frequency... |  |  Computational Intelligence in Telecommunications Networks
Telecommunications has evolved and grown at an explosive rate in recent years and will undoubtedly continue to do so. As its functions, applications, and technology grow, it becomes increasingly complex and difficult, if not impossible, to meet the demands of a global network using conventional computing technologies. Computational... |  |  Role-Based Access Control
Role-based access control (RBAC) is a technology that is attracting a great deal of attention, particularly for commercial applications, because of its potential for reducing the complexity and cost of security administration in large networked applications. Under RBAC, security administration is greatly simplified by using roles,... |
|
|
|
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 |