Home | Amazing | Today | Tags | Publishers | Years | Search 
Broadband Mobile Multimedia: Techniques and Applications (Wireless Networks and Mobile Communications)
Broadband Mobile Multimedia: Techniques and Applications (Wireless Networks and Mobile Communications)
Multimedia service provisioning is believed to be one of the prerequisites to guarantee the success of next-generation wireless networks. Examining the role of multimedia in state-of-the-art wireless systems and networks, Broadband Mobile Multimedia: Techniques and Applications presents a collection of introductory concepts,...
Building A Global Information Assurance Program
Building A Global Information Assurance Program
Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function. These government and business entities are...
E-collaboration in Modern Organizations: Initiating and Managing Distributed Projects (Premier Reference Source)
E-collaboration in Modern Organizations: Initiating and Managing Distributed Projects (Premier Reference Source)
E-Collaboration in Modern Organizations: Initiating and Managing Distributed Project combines comprehensive research related to e-collaboration in modern organizations, emphasizing topics relevant to those involved in initiating and managing distributed projects. Providing authoritative content to scholars, researchers, and...
The Twofish Encryption Algorithm: A 128-Bit Block Cipher
The Twofish Encryption Algorithm: A 128-Bit Block Cipher
The first and only guide to one of today’s most important new cryptography algorithms The Twofish Encryption Algorithm A symmetric block cipher that accepts keys of any length, up to 256 bits, Twofish is among the new encryption algorithms being considered by the National Institute of Science and Technology (NIST) as a replacement for the DES...
Affect and Emotion in Human-Computer Interaction: From Theory to Applications (Lecture Notes in Computer Science)
Affect and Emotion in Human-Computer Interaction: From Theory to Applications (Lecture Notes in Computer Science)
Affect and emotion play an important role in our everyday lives: They are present whatever we do, wherever we are, and wherever we go, without us being aware of them for much of the time. When it comes to interaction, be it with humans, technology, or humans via technology, we suddenly become more aware of emotion, either by seeing the...
Mastering Dojo: JavaScript and Ajax Tools for Great Web Experiences (Pragmatic Programmers)
Mastering Dojo: JavaScript and Ajax Tools for Great Web Experiences (Pragmatic Programmers)
The last couple of years have seen big changes in server-side web programming. Now it's the client's turn; Dojo is the toolkit to make it happen and Mastering Dojo shows you how.

Dojo is a set of client-side JavaScript tools that help you build better web applications. Dojo blurs the line between local, native applications and browser based...

Information Warfare and Organizational Decision-Making
Information Warfare and Organizational Decision-Making
Organizations are among the most valuable and yet most fragile structures of our civilization. We rely on organizations to obtain information, to comprehend and process information, to accumulate and internalize information, to make decisions based in part on that information, and to execute those decisions. Organizations are ubiquitous because...
Clean Code: A Handbook of Agile Software Craftsmanship (Robert C. Martin Series)
Clean Code: A Handbook of Agile Software Craftsmanship (Robert C. Martin Series)

Even bad code can function. But if code isn’t clean, it can bring a development organization to its knees. Every year, countless hours and significant resources are lost because of poorly written code. But it doesn’t have to be that way.

Noted software expert Robert C. Martin presents a revolutionary paradigm with
...

Millimeter Wave Technology in Wireless PAN, LAN, and MAN (Wireless Networks and Mobile Communications)
Millimeter Wave Technology in Wireless PAN, LAN, and MAN (Wireless Networks and Mobile Communications)
Driven by the demand for high-data-rate, millimeter wave technologies with broad bandwidth are being explored in high-speed wireless communications. These technologies include gigabit wireless personal area networks (WPAN), high-speed wireless local area networks (WLAN), and high-speed wireless metropolitan area networks (WMAN). As a result of this...
Artificial Intelligence: A Guide to Intelligent Systems (2nd Edition)
Artificial Intelligence: A Guide to Intelligent Systems (2nd Edition)
Provides a practical introduction to artificial intelligence that is less mathematically rigorous than other books on the market. Appropriate for programmers looking for an overview of all facets of artificial intelligence.

[Shelving Category] Artificial Intelligence/Soft Computing

Artificial Intelligence is often perceived...

Programming 32-bit Microcontrollers in C: Exploring the PIC32 (Embedded Technology)
Programming 32-bit Microcontrollers in C: Exploring the PIC32 (Embedded Technology)
The FIRST book on Microchip's latest and greatest 32-bit architecture: the PIC32 written by a true Microchip insider!

*Just months after the introduction of the new generation of 32-bit PIC microcontrollers, a Microchip insider and acclaimed author takes you by hand at the exploration of the PIC32

*Free CD-ROM
...
The Art of Sound Reproduction
The Art of Sound Reproduction
Designed to make life a little easier by providing all the theoretical background necessary to understand sound reproduction, backed up with practical examples. Specialist terms - both musical and physical - are defined as they occur and plain English is used throughout. Analog and digital audio are considered as alternatives, and the advantages of...
Result Page: 788 787 786 785 784 783 782 781 780 779 778 777 776 775 774 773 772 771 770 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy