Home | Amazing | Today | Tags | Publishers | Years | Search 
Computer Architecture, Fourth Edition: A Quantitative Approach
Computer Architecture, Fourth Edition: A Quantitative Approach

The era of seemingly unlimited growth in processor performance is over: single chip architectures can no longer overcome the performance limitations imposed by the power they consume and the heat they generate. Today, Intel and other semiconductor firms are abandoning the single fast processor model in favor of multi-core...

Aided Navigation: GPS with High Rate Sensors
Aided Navigation: GPS with High Rate Sensors
Design Cutting-Edge Aided Navigation Systems for Advanced Commercial & Military Applications

Aided Navigation is a design-oriented textbook and guide to building aided navigation systems for smart cars, precision farming vehicles, smart weapons, unmanned aircraft, mobile robots, and other advanced applications....

CCNA Security Official Exam Certification Guide  (Exam 640-553)
CCNA Security Official Exam Certification Guide (Exam 640-553)

CCNA Security Official Exam Certification Guide is a best of breed Cisco® exam study guide that focuses specifically on the objectives for the CCNA® Security IINS exam. Senior security instructors Michael Watkins and Kevin Wallace share preparation hints and test-taking tips, helping you identify areas of...

A Unified Framework for Video Summarization, Browsing & Retrieval: with Applications to Consumer and Surveillance Video
A Unified Framework for Video Summarization, Browsing & Retrieval: with Applications to Consumer and Surveillance Video
Large volumes of video content can only be easily accessed by the use of rapid browsing and retrieval techniques. Constructing a video table of contents (ToC) and video highlights to enable end users to sift through all this data and find what they want, when they want are essential. This reference puts forth a unified framework to integrate these...
Digital Storage in Consumer Electronics: The Essential Guide (Embedded Technology)
Digital Storage in Consumer Electronics: The Essential Guide (Embedded Technology)
This book will immediately become an indispensable reference book for the storage industry movers and shakers, developers and users. It will be a valued contribution for years to come. - Rick Wietfeldt, CTO, Emerging Technologies and Strategy, Texas Instruments, Inc.

Consumer electronics engineers, technicians, and managers,
...
Postfix (Other Sams)
Postfix (Other Sams)
Networking guide to the Postfix Mail Transfer software package, showing how to configure Postfix for specific tasks, how to use external databases with Postfix, and how to migrate from Sendmail. Also explains e-mail protocols, setting up Postfix as an ISP or office mail server, and using list servers and Web mail interfaces with Postfix. Softcover....
Dynamic Simulations of Electric Machinery: Using MATLAB/SIMULINK
Dynamic Simulations of Electric Machinery: Using MATLAB/SIMULINK
Everything you need to use MATLAB and SIMULINK for interactive modeling.

With today's personal computers, students have the power to create simulations of electric machinery that allow them to study transient and control performance and test conceptual designs. The outcome of these simulations can reveal behaviors that may not have been readily...

Wireless Communications
Wireless Communications
This book provides a comprehensive introduction to the basic principles, design techniques and analytical tools of wireless communications, focusing primarily on the design of practical systems. It begins with an overview of wireless systems and standards. The characteristics of the wireless channel are then described, including capacity limits....
Pattern Recognition, Second Edition
Pattern Recognition, Second Edition
Pattern recognition is becoming increasingly important in the age of automation and information handling and retrieval.
This book provides the most comprehensive treatment available of pattern recognition, from an engineering perspective. Developed through more than ten years of teaching experience, Pattern Recognition is appropriate for both
...
Digital Watermarking and Steganography, 2nd Ed. (The Morgan Kaufmann Series in Multimedia Information and Systems)
Digital Watermarking and Steganography, 2nd Ed. (The Morgan Kaufmann Series in Multimedia Information and Systems)
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties...
Mobile Computing Principles: Designing and Developing Mobile Applications with UML and XML
Mobile Computing Principles: Designing and Developing Mobile Applications with UML and XML
Written to address technical concerns that mobile developers face regardless of platform, this book explores the differences between mobile and stationary applications and the architectural and software development concepts needed to build mobile applications. Using UML, Reza B'far guides the developer through the development process, from design...
25 Years of Model Checking: History, Achievements, Perspectives (Lecture Notes in Computer Science)
25 Years of Model Checking: History, Achievements, Perspectives (Lecture Notes in Computer Science)
Model checking technology is among the foremost applications of logic to computer science and computer engineering. The model checking community has achieved many breakthroughs, bridging the gap between theoretical computer science and hardware and software engineering, and it is reaching out to new challenging areas such as system biology and...
Result Page: 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 73 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy