Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
New Geometric Data Structures for Collision Detection and Haptics (Springer Series on Touch and Haptic Systems)
New Geometric Data Structures for Collision Detection and Haptics (Springer Series on Touch and Haptic Systems)

Starting with novel algorithms for optimally updating bounding volume hierarchies of objects undergoing arbitrary deformations, the author presents a new data structure that allows, for the first time, the computation of the penetration volume. The penetration volume is related to the water displacement of the overlapping region, and thus...

The Tao of Network Security Monitoring : Beyond Intrusion Detection
The Tao of Network Security Monitoring : Beyond Intrusion Detection

Every network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen?

...
Next Generation Intelligent Optical Networks: From Access to Backbone
Next Generation Intelligent Optical Networks: From Access to Backbone
Optical networks have been in commercial deployment since the early 1980s as a result of advances in optical, photonic, and material technologies. Although the initial deployment was based on silica fiber with a single wavelength modulated at low data rates, it was quickly demonstrated that fiber can deliver much more bandwidth than any other...
Wireless Networks: Multiuser Detection in Cross-Layer Design (Information Technology: Transmission, Processing and Storage)
Wireless Networks: Multiuser Detection in Cross-Layer Design (Information Technology: Transmission, Processing and Storage)
Cross-layer design seeks to enhance the capacity of wireless networks significantly through the joint optimization of multiple layers in the network, primarily the physical (PHY) and medium access control (MAC) layers. Although there are advantages of such design in wireline networks as well, this approach is particularly advantageous for wireless...
JUNOS Security
JUNOS Security

Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations...

Community-Acquired Pneumonia (Birkh?user Advances in Infectious Diseases)
Community-Acquired Pneumonia (Birkh?user Advances in Infectious Diseases)
Community-acquired pneumonia is a disease of high morbidity and mortality. Demographic changes in industrialised countries with a growing population of elderly persons will add to its significance. In the last years much progress in the field of community-acquired pneumonia has been achieved. Vaccination programs against...
Radar and ARPA Manual, Third Edition: Radar, AIS and Target Tracking for Marine Radar Users
Radar and ARPA Manual, Third Edition: Radar, AIS and Target Tracking for Marine Radar Users

Radar and ARPA Manual provides essential information for professional mariners and seagoing marine engineers, including those undertaking electronic navigation system courses and marine operations qualifications internationally.

This fully revised new edition serves as the most comprehensive reference on equipment and techniques...

Distributed Algorithms (The Morgan Kaufmann Series in Data Management Systems)
Distributed Algorithms (The Morgan Kaufmann Series in Data Management Systems)
In Distributed Algorithms, Nancy Lynch provides a blueprint for designing, implementing, and analyzing distributed algorithms. She directs her book at a wide audience, including students, programmers, system designers, and researchers.

Distributed Algorithms
contains the most significant algorithms and impossibility
...
Corrosion Prevention and Protection: Practical Solutions
Corrosion Prevention and Protection: Practical Solutions

There are many books and monographs on corrosion, such as Corrosion and Corrosion Control by H. H. Uhlig and R. W. Revie; Corrosion Engineering by M. G. Fontana and N. D. Greene; Principles and Prevention of Corrosion by D. A. Jones; An Introduction to Corrosion and Protection of Metals by G. Wranglen; and Corrosion for Science and...

Active Defense: A Comprehensive Guide to Network Security
Active Defense: A Comprehensive Guide to Network Security
Today's networks incorporate more security features than ever before, yet
hacking grows more common and more severe. Technology alone is not the
answer. You need the knowledge to select and deploy the technology
effectively, and the guidance of experts to develop a comprehensive plan that
keeps your organization two steps ahead
...
Prevention of Blindness from Diabetes Mellitus: Report of a WHO Consultation
Prevention of Blindness from Diabetes Mellitus: Report of a WHO Consultation

Diabetes mellitus is an important public health problem worldwide, and more than 75% of patients who have had diabetes mellitus for more than 20 years will have some sort of retinopathy. Diabetic retinopathy correlates with the duration of diabetes; thus with increasing life expectancy, diabetic retinopathy and the ensuing blindness will tend...

Error Correction Coding: Mathematical Methods and Algorithms
Error Correction Coding: Mathematical Methods and Algorithms
An unparalleled learning tool and guide to error correction coding

Error correction coding techniques allow the detection and correction of errors occurring during the transmission of data in digital communication systems. These techniques are nearly universally employed in modern communication systems, and are thus an important component of...

unlimited object storage image
Result Page: 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy