Home | Amazing | Today | Tags | Publishers | Years | Search 
The Auction App: How Companies Tap the Power of Online Auctions to Maximize Revenue Growth
The Auction App: How Companies Tap the Power of Online Auctions to Maximize Revenue Growth

How companies such as L. L. Bean and Sun Microsystems are using online auctions to help boost their bottom lines

From liquidating excess inventory to B2B materials procurement, corporate America has discovered online auctions as a catalyst for redefining old supply-chain relationships and business practices. Most analysts...

Nazi Germany and the Jews, 1933-1945: Abridged Edition
Nazi Germany and the Jews, 1933-1945: Abridged Edition

Nazi Germany and the Jews, 1933-1945 is an abridged edition of Saul Friedländer's definitive Pulitzer Prize-winning two-volume history of the Holocaust: Nazi Germany and the Jews: The Years of Persecution, 1933-1939 and The Years of Extermination: Nazi Germany and the Jews, 1939-1945.

The book's...

Teamwork in Multi-Agent Systems: A Formal Approach (Wiley Series in Agent Technology)
Teamwork in Multi-Agent Systems: A Formal Approach (Wiley Series in Agent Technology)

What makes teamwork tick?

Cooperation matters, in daily life and in complex applications. After all, many tasks need more than a single agent to be effectively performed. Therefore, teamwork rules!

Teams are social groups of agents dedicated to the fulfilment of particular persistent tasks. In modern multiagent...

Coaching Agile Teams: A Companion for ScrumMasters, Agile Coaches, and Project Managers in Transition
Coaching Agile Teams: A Companion for ScrumMasters, Agile Coaches, and Project Managers in Transition

The Provocative and Practical Guide to Coaching Agile Teams

As an agile coach, you can help project teams become outstanding at agile, creating products that make them proud and helping organizations reap the powerful benefits of teams that deliver both innovation and excellence.

Wireless Sensor Networks (Ian F. Akyildiz Series in Communications and Networking)
Wireless Sensor Networks (Ian F. Akyildiz Series in Communications and Networking)

This book presents an in-depth study on the recent advances in Wireless Sensor Networks (WSNs). The authors describe the existing WSN applications and discuss the research efforts being undertaken in this field. Theoretical analysis and factors influencing protocol design are also highlighted. The authors explore state-of-the-art protocols...

The Facebook Effect: The Inside Story of the Company That Is Connecting the World
The Facebook Effect: The Inside Story of the Company That Is Connecting the World

IN LITTLE MORE THAN HALF A DECADE, Facebook has gone from a dorm-room novelty to a company with 500 million users. It is one of the fastest growing companies in history, an essential part of the social life not only of teenagers but hundreds of millions of adults worldwide. As Facebook spreads around the globe, it creates surprising...

CUDA by Example: An Introduction to General-Purpose GPU Programming
CUDA by Example: An Introduction to General-Purpose GPU Programming

CUDA is a computing architecture designed to facilitate the development of parallel programs. In conjunction with a comprehensive software platform, the CUDA Architecture enables programmers to draw on the immense power of graphics processing units (GPUs) when building high-performance applications. GPUs, of course, have...

Information Security and Cryptology: 5th International Conference, Inscrypt 2009
Information Security and Cryptology: 5th International Conference, Inscrypt 2009

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2009, held in Beijing, China, in December 2009. The 22 revised full papers and 10 short papers presented were carefully reviewed and selected from 147 submissions. The papers are...

Location-Based Services Handbook: Applications, Technologies, and Security
Location-Based Services Handbook: Applications, Technologies, and Security

Location-Based Services Handbook: Applications, Technologies, and Security is a comprehensive reference containing all aspects of essential technical information on location-based services (LBS) technology. With broad coverage ranging from basic concepts to research-grade material, it presents a much-needed overview of...

An Introduction to MultiAgent Systems
An Introduction to MultiAgent Systems

Multiagent systems are systems composed of multiple interacting computing elements, known as agents. Agents are computer systems with two important capabilities. First, they are at least to some extent capable of autonomous action - of deciding for themselves what they need to do in order to satisfy their design objectives. Second, they are...

Understanding Voice over IP Security (Artech House Telecommunications Library)
Understanding Voice over IP Security (Artech House Telecommunications Library)

VoIP is poised to take over from the century-old public switched telephone network (PSTN). But VoIP telephony does not enjoy the same privacy as the old PSTN. This is because PSTN phone calls were based on establishing a “closed circuit” between the two parties, while VoIP phone calls send packets through the Internet, which...

Developing J2EE Applications with WebSphere Studio: IBM Certified Enterprise Developer (IBM Certification Study Guides)
Developing J2EE Applications with WebSphere Studio: IBM Certified Enterprise Developer (IBM Certification Study Guides)

To succeed in today's challenging business environment, companies need software developers who can implement integrated enterprise-wide applications and satisfy the demands of customers whose needs continue to evolve. Not only can you become that enterprise developer, but you can also be certified by IBM in the greatest technology...

Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy