Home | Amazing | Today | Tags | Publishers | Years | Search 
Learning from Data Streams: Processing Techniques in Sensor Networks
Learning from Data Streams: Processing Techniques in Sensor Networks
Sensor networks consist of distributed autonomous devices that cooperatively monitor an environment. Sensors are equipped with capacities to store information in memory, process this information and communicate with their neighbors. Processing data streams generated from wireless sensor networks has raised new research challenges over the last few...
Scalable and Secure Internet Services and Architecture
Scalable and Secure Internet Services and Architecture
Scalable and Secure Internet Services and Architecture provides an in-depth analysis of many key scaling technologies. Topics include: server clusters and load balancing; QoS-aware resource management; server capacity planning; Web caching and prefetching; P2P overlay network; mobile code and security; and mobility support for adaptive grid...
Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase
Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase
"Today, databases house our 'information crown jewels', but database security is one of the weakest areas of most information security programs. With this excellent book, Ben-Natan empowers you to close this database security gap and raise your database security bar!" Bruce W. Moulton. CISO/VP, Fidelity Investments (1995 - 2001)...
J2EE AntiPatterns
J2EE AntiPatterns
"The insights in this book are based on proven solutions from experts. They will ensure the success of your J2EE implementations."
—Bill Brown, AntiPattern Evangelist

All too often delivered software is full of bugs and poorly performing processes. Unfortunately, uncovering exactly what has gone wrong and what needs to...

Information Quality Management: Theory and Applications
Information Quality Management: Theory and Applications
The current era is associated with widespread and successive waves of technologydriven innovations in information technology (IT). Technologies, such as the Internet, electronic commerce, World Wide Web (WWW), and mobile commerce, bring with them ubiquitous connectivity, real-time access, and overwhelming volumes of data and information. More and...
See MIPS Run, Second Edition
See MIPS Run, Second Edition
This second edition is not only a thorough update of the first edition, it is also a marriage of the best-known RISC architecture--MIPS--with the best-known open-source OS--Linux. The first part of the book begins with MIPS design principles and then describes the MIPS instruction set and programmers resources. It uses the MIPS32 standard as a...
Multiagent System Technologies: Second German Conference, MATES 2004, Erfurt, Germany, September 29-30, 2004, Proceedings
Multiagent System Technologies: Second German Conference, MATES 2004, Erfurt, Germany, September 29-30, 2004, Proceedings
This book constitutes the refereed proceedings of the Second German Conference on Multiagent Systems Technologies, MATES 2004, held in Erfurt, Germany, in September 2004.

The 22 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 60 submissions. The papers are organized in topical sections on...

Software Defined Radio: The Software Communications Architecture (Wiley Series in Software Radio)
Software Defined Radio: The Software Communications Architecture (Wiley Series in Software Radio)

The Software Communications Architecture (SCA) establishes an implementation-independent framework for the development of Joint Tactical Radio System software configurable radios. It specifies the Operating Environment, services and interfaces that applications use.

Software Defined Radio: The Software...

Beowulf Cluster Computing with Linux (Scientific and Engineering Computation)
Beowulf Cluster Computing with Linux (Scientific and Engineering Computation)
Beowulf clusters, which exploit mass-market PC hardware and software in conjunction with cost-effective commercial network technology, are becoming the platform for many scientific, engineering, and commercial applications. With growing popularity has come growing complexity. Addressing that complexity, Beowulf Cluster Computing with Linux and...
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities...
Outlook 2007: Beyond the Manual
Outlook 2007: Beyond the Manual
Many people use Outlook either by choice or by force, but few of them do more than scratch the surface of the personal information manager's many features. And after years of spending hours each day within Outlook, most users become at least proficient with its base features.

Outlook 2007: Beyond the Manual takes you to the next level,...

The Agent Modeling Language - AML: A Comprehensive Approach to Modeling Multi-Agent Systems
The Agent Modeling Language - AML: A Comprehensive Approach to Modeling Multi-Agent Systems
Multi-agent systems are already a focus of studies for more than 25 years. Despite substantial effort of an active research community, modeling of multi-agent systems still lacks complete and proper definition, general acceptance, and practical application. Due to the vast potential of these systems e.g. to improve the practice in software and to...
Result Page: 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy