Home | Amazing | Today | Tags | Publishers | Years | Search 
Rule-Based Reasoning, Programming, and Applications: 5th International Symposium, RuleML 2011
Rule-Based Reasoning, Programming, and Applications: 5th International Symposium, RuleML 2011

The 5th International Symposium on Rules: Research Based and Industry Focused (RuleML-2011@IJCAI), collocated in Barcelona, Spain, with the 22nd International Joint Conference on Artificial Intelligence, was the premier place to meet and to exchange ideas from all fields of rule technology. The aim of RuleML-2011 was to build a bridge between...

GSM System Engineering (Artech House Mobile Communications Series)
GSM System Engineering (Artech House Mobile Communications Series)
Cellular communications is one of the fastest growing and most challenging telecommunication applications ever. Today, it represents a large and continuously increasing percentage of all new telephone subscribers around the world. In the long term, cellular digital technology may become the universal way of communication.
...
Applied Semantic Web Technologies
Applied Semantic Web Technologies
Since Tim Berners-Lee’s original idea for a global system of interlinked hypertext documents from 1989, the World Wide Web has grown into the world’s biggest pool of human knowledge. Over the past few years, the Web has changed the way people communicate and exchange information. It has created new business...
Java Software Solutions: Foundations of Program Design, Update JavaPlace
Java Software Solutions: Foundations of Program Design, Update JavaPlace
This book is about writing well-designed software. To understand software, we must first have a fundamental understanding of its role in a computer system. Hardware and software cooperate in a computer system to accomplish complex tasks. The nature of that cooperation and the purpose of various hardware components are important...
Optimization for Machine Learning (Neural Information Processing series)
Optimization for Machine Learning (Neural Information Processing series)
The intersection of interests between machine learning and optimization has engaged many leading researchers in both communities for some years now. Both are vital and growing fields, and the areas of shared interest are expanding too. This volume collects contributions from many researchers who have been a part of these...
Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges
Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges
Peer-to-peer computing, at least on a conceptual level, is a genuine paradigm shift—intelligence is at the edge, computing is completely decentralized, and the network is just there to knit the distributed intelligence together. Indeed, with advancements in hardware technology, proliferation of the open source development...
Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-to-peer (P2P) has proven as a most successful way to produce large scale, reliable, and cost-effective applications, as illustrated for file sharing or VoIP. P2P storage is an emerging field of application which allows peers to collectively leverage their resources towards ensuring the reliability and availability of user...
Arduino Internals
Arduino Internals

Let's investigate the inner-workings of your Arduino. It appears to be a simple machine, but it is not. Much effort has been invested to make it easy to learn and use. Unfortunately, these good intentions can mask some of the Arduino's underlying capabilities. You suspected that there was more, much more, under the simplistic...

Handbook of FPGA Design Security
Handbook of FPGA Design Security

The purpose of this book is to provide a practical approach to managing security in FPGA designs for researchers and practitioners in the electronic design automation (EDA) and FPGA communities, including corporations, industrial and government research labs, and academics. This book combines theoretical underpinnings with a practical...

A Decade of Concurrency: Reflections and Perspectives. REX School/Symposium Noordwijkerhout, The Netherlands
A Decade of Concurrency: Reflections and Perspectives. REX School/Symposium Noordwijkerhout, The Netherlands

The REX School/Symposium *A Decade of Concurrency - Reflections and Perspectives' was the final event of a ten year period of cooperation between three Dutch research groups working on the foundations of concurrency. Ever since its inception in 1983. the goal of the project has been'to contribute to the crossfertilization...

Security in Computing Systems: Challenges, Approaches and Solutions
Security in Computing Systems: Challenges, Approaches and Solutions

This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of secu rity with respect to computing. Here, “computing” refers to all activities which individuals or groups directly or indirectly perform by means of computing sys tems,...

Designing Interactive Systems: People, Activities, Contexts, Technologies
Designing Interactive Systems: People, Activities, Contexts, Technologies

Designing Interactive Systems: People, Activities, Contexts, Technologies is an exciting, new, forward-looking textbook in Human Computer Interaction (HCI). Authoritative in its coverage, this innovative book takes a top-down approach, starting with what is familiar to students and working down to theory/abstract underpinnings. This makes it...

Result Page: 22 21 20 19 18 17 16 15 14 13 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy