Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Software Development and Professional Practice
Software Development and Professional Practice

What’s this book all about? Well, it’s about how to develop software, from a personal perspective. We’ll look at what it means for you to take a problem and produce a program to solve it from beginning to end. That said, this book focuses a lot on design. How do you design software? What things do you take into...

Concurrent, Real-Time and Distributed Programming in Java: Threads, RTSJ and RMI (Focus: Computer Science)
Concurrent, Real-Time and Distributed Programming in Java: Threads, RTSJ and RMI (Focus: Computer Science)

This book provides an introduction to concurrent, real-time, distributed programming with Java object-oriented language support as an algorithm description tool. It describes in particular the mechanisms of synchronization (cooperative and competitive) and sharing of data (internal class, static variables) between threads in Java. He...

Bio-Inspired Artificial Intelligence: Theories, Methods, and Technologies (Intelligent Robotics and Autonomous Agents)
Bio-Inspired Artificial Intelligence: Theories, Methods, and Technologies (Intelligent Robotics and Autonomous Agents)
New approaches to artificial intelligence spring from the idea that intelligence emerges as much from cells, bodies, and societies as it does from evolution, development, and learning. Traditionally, artificial intelligence has been concerned with reproducing the abilities of human brains; newer approaches take inspiration from a wider range of...
Designing Collaborative Systems: A Practical Guide to Ethnography (Computer Supported Cooperative Work)
Designing Collaborative Systems: A Practical Guide to Ethnography (Computer Supported Cooperative Work)
Designing Collaborative Systems: A Practical Guide to Ethnography introduces a new 'ethnographic' approach that will enable designers to create collaborative and interactive systems, which are employed successfully in real-world settings. This new approach, adapted from the field of social research, considers both the social...
MIMO Wireless Networks, Second Edition: Channels, Techniques and Standards for Multi-Antenna, Multi-User and Multi-Cell Systems
MIMO Wireless Networks, Second Edition: Channels, Techniques and Standards for Multi-Antenna, Multi-User and Multi-Cell Systems

This book is unique in presenting channels, techniques and standards for the next generation of MIMO wireless networks. Through a unified framework, it emphasizes how propagation mechanisms impact the system performance under realistic power constraints. Combining a solid mathematical analysis with a physical and intuitive approach to...

Monitoring, Security, and Rescue Techniques in Multiagent Systems (Advances in Soft Computing)
Monitoring, Security, and Rescue Techniques in Multiagent Systems (Advances in Soft Computing)
In todays society the issue of security, understood in the widest context, have become a crucial one. The people of the information age, having instant access to the sources of knowledge and information expect the technology to improve their safety in all respects. That, straightforwardly, leads to the demand for methods, technologies, frameworks...
Great Jobs for Engineering Majors (Great Jobs Series)
Great Jobs for Engineering Majors (Great Jobs Series)
Engineer a bright future for yourself!

You've worked hard for that engineering degree. Now what? Sometimes the choice of careers can seem endless; the most difficult part of a job search is narrowing down your options.

Great Jobs for Engineering Majors will help you choose the right career out of the myriad...

Scene of the Cybercrime: Computer Forensics Handbook
Scene of the Cybercrime: Computer Forensics Handbook

"Cybercrime and cyber-terrorism represent a serious challenge to society as a whole." - Hans Christian Krüger, Deputy Secretary General of the Council of Europe
Crime has been with us as long as laws have existed, and modern technology has given us a new type of criminal activity: cybercrime. Computer and
...

Artificial Intelligence in Theory and Practice: IFIP 19th World Computer Congress, TC 12: IFIP AI 2006 Stream, August 21-24, 2006, Santiago, Chile
Artificial Intelligence in Theory and Practice: IFIP 19th World Computer Congress, TC 12: IFIP AI 2006 Stream, August 21-24, 2006, Santiago, Chile
This volume presents proceedings from the 19th IFIP World Computer Congress in Santiago, Chile. The proceedings of the World Computer Congress are a product of the gathering of 2,000 delegates from more than 70 countries to discuss a myriad of topics in the ICT domain. Of particular note, this marks the first time that a World Computer Congress has...
Cooperative Control of Distributed Multi-Agent Systems
Cooperative Control of Distributed Multi-Agent Systems

The paradigm of ‘multi-agent’ cooperative control is the challenge frontier for new control system application domains, and as a research area it has experienced a considerable increase in activity in recent years. This volume, the result of a UCLA collaborative project with Caltech, Cornell and MIT, presents cutting edge results in...

Feedback Strategies for Wireless Communication
Feedback Strategies for Wireless Communication

This book explores the different strategies regarding limited feedback information. The book analyzes the impact of quantization and the delay of CSI on the performance. The author shows the effect of the reduced feedback information and gives an overview about the feedback strategies in the standards. This volume presents theoretical...

How We Cooperate: A Theory of Kantian Optimization
How We Cooperate: A Theory of Kantian Optimization
A new theory of how and why we cooperate, drawing from economics, political theory, and philosophy to challenge the conventional wisdom of game theory

Game theory explains competitive behavior by working from the premise that people are self-interested. People don’t just compete, however; they also
...
unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy