Home | Amazing | Today | Tags | Publishers | Years | Search 
Foundations of Dependable Computing: System Implementation
Foundations of Dependable Computing: System Implementation
Foundations of Dependable Computing: System Implementation, explores the system infrastructure needed to support the various paradigms of Paradigms for Dependable Applications. Approaches to implementing support mechanisms and to incorporating additional appropriate levels of fault detection and fault tolerance at the processor, network, and...
Coping with Interference in Wireless Networks (Signals and Communication Technology)
Coping with Interference in Wireless Networks (Signals and Communication Technology)

Unlike wired networks where transmitters have no effect on receivers other than their own, in wireless networks we are limited by interference. The traditional routing methods are not optimal any more when it comes to a wireless medium. The maximum data rate on each link depends not only on the power in that link but also on the transmitted...

Design Methods and Applications for Distributed Embedded Systems
Design Methods and Applications for Distributed Embedded Systems

The ever decreasing price/performance ratio of microcontrollers makes it economically attractive to replace more and more conventional mechanical or electronic control systems within many products by embedded real-time computer systems. An embedded real-time computer system is always part of a well-specified larger system, which we call an...

Machine Learning for Vision-Based Motion Analysis: Theory and Techniques
Machine Learning for Vision-Based Motion Analysis: Theory and Techniques

Techniques of vision-based motion analysis aim to detect, track, identify, and generally understand the behavior of objects in image sequences. With the growth of video data in a wide range of applications from visual surveillance to human-machine interfaces, the ability to automatically analyze and understand object motions from video...

Handbook of Face Recognition
Handbook of Face Recognition

Face recognition has a large number of applications, including security, person verification, Internet communication, and computer entertainment. Although research in automatic face recognition has been conducted since the 1960s, this problem is still largely unsolved. Recent years have seen significant progress in this area owing to advances...

Hardening Cisco Routers (O'Reilly Networking)
Hardening Cisco Routers (O'Reilly Networking)

Master one single topic, and everything becomes clearer.

The field of network security is a huge subject. To be a network security expert, you must be an expert on routers, switches, hubs, firewalls, intrusion detection systems (IDS), servers, desktops, email, HTTP, instant messages, sniffers, and a thousand other topics. There are...

Winning Design!: LEGO MINDSTORMS NXT Design Patterns for Fun and Competition
Winning Design!: LEGO MINDSTORMS NXT Design Patterns for Fun and Competition

Winning Design! LEGO Mindstorms NXT Design Patterns for Fun and Competition is about design that works. It’s about building with LEGO MINDSTORMS NXT for fun, for education, but especially for competition. Author James Trobaugh is an experienced coach and leader in the FIRST LEGO League. In this book, he shares his hard-won...

Hands-On Guide to Flash Video: Web Video and Flash Media Server (Hands-On Guide Series)
Hands-On Guide to Flash Video: Web Video and Flash Media Server (Hands-On Guide Series)

The Hands-On Guide to Flash Video is a professional reference book written by industry experts that are currently helping professionals produce Web video and implement Flash Media Server. This book covers Flash Video production from soup to nuts, beginning with how to configure your camcorder and ending to advanced server techniques like...

The Game Maker's Companion
The Game Maker's Companion

The Game Maker’s Companion is the long-awaited sequel to The Game Maker’s Apprentice. This book picks up where the last book left off, advancing your game development journey with some seriously impressive gaming projects. This time you’ll learn how to make professional-quality platform games with solid...

Air and Spaceborne Radar Systems (Radar, Sonar, Navigation and Avionics)
Air and Spaceborne Radar Systems (Radar, Sonar, Navigation and Avionics)

The history of airborne radar is almost as old as that of radar itself. The improvement in detection range provided by an airborne platform was realised early during the Second World War, and the development of the cavity magnetron at almost the same time allowed higher radar frequencies and, hence, directive antennas to be used. Nowadays,...

An Experimental Approach to CDMA and Interference Mitigation: From System Architecture to Hardware Testing through VLSI Design
An Experimental Approach to CDMA and Interference Mitigation: From System Architecture to Hardware Testing through VLSI Design

The key of a successful approach to the complex issue of designing wireless terminals for present and future communication systems (usually addressed to as '3rd Generation and beyond') lies in a single 'magic' word: multidisciplinarity. This was actually the philosophy which inspired and drove a fruitful teamwork performed at...

Mining the Social Web: Analyzing Data from Facebook, Twitter, LinkedIn, and Other Social Media Sites
Mining the Social Web: Analyzing Data from Facebook, Twitter, LinkedIn, and Other Social Media Sites

Facebook, Twitter, and LinkedIn generate a tremendous amount of valuable social data, but how can you find out who's making connections with social media, what they’re talking about, or where they’re located? This concise and practical book shows you how to answer these questions and more. You'll learn how to...

Result Page: 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy