Home | Amazing | Today | Tags | Publishers | Years | Search 
Cracked Media: The Sound of Malfunction
Cracked Media: The Sound of Malfunction
In a small warehouse gallery space in the center of Sydney a noise turntablist, Lucas Abela, stands over a stack of vinyl that is bolted to the rotary device of an industrial sewing machine. Instead of spinning the records at 33 or 45 revolutions per minute this “turntable” spins the records at up to 2,850 revolutions per minute. The...
Towards a Critical Sociology (Routledge Revivals): An Essay on Commonsense and Imagination
Towards a Critical Sociology (Routledge Revivals): An Essay on Commonsense and Imagination

For the better part of its history sociology shared with commonsense its assumption of the ‘nature-like’ character of society – and consequently developed as the science of unfreedom. In this powerful and engaging work, first published in 1976, Professor Bauman outlines the historical roots of such a science and describes how...

Security and Privacy in Mobile Information and Communication Systems: First International ICST Conference, MobiSec 2009
Security and Privacy in Mobile Information and Communication Systems: First International ICST Conference, MobiSec 2009

MobiSec 2009 was the first ICST conference on security and privacy in mobile information and communication systems. With the the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale...

Ubiquitous Multimedia Computing
Ubiquitous Multimedia Computing

Computing is ubiquitous and if you think otherwise, that in itself might be the best evidence that it is so. Computers are omnipresent in modern life and the multimedia computing environment of today is becoming more and more seamless.

Bringing together contributions from dozens of leading experts, Ubiquitous Multimedia...

Microsoft SQL Server 2008 Reporting Services Unleashed
Microsoft SQL Server 2008 Reporting Services Unleashed

The authoritative, example-rich guide to Microsoft’s powerful reporting platform

With Microsoft SQL Server 2008 Reporting Services you can quickly deliver relevant business intelligence data wherever it’s needed–across the entire enterprise, and through the entire reporting lifecycle. SQL...

Cocoa Touch for iPhone OS 3 (Developer Reference)
Cocoa Touch for iPhone OS 3 (Developer Reference)

Join the gold rush to developing cool iPhone apps with this complete iPhone OS 3 developer’s guide. Professional developer Jiva DeVoe speaks your language, and he talks you through the entire process—from explaining Cocoa Touch and the iPhone SDK to using Xcode and the Game Kit API. Follow step-by-step tutorials, then apply practical...

Class, Culture and Suburban Anxieties in the Victorian Era (Routledge Studies in Nineteenth Century Literature)
Class, Culture and Suburban Anxieties in the Victorian Era (Routledge Studies in Nineteenth Century Literature)

This book demonstrates how representations of the Victorian suburb in mid- to late-nineteenth century British writing occasioned a literary sub-genre unique to this period, one that attempted to reassure readers that the suburb was a place where outsiders could be controlled and where middle-class values could be enforced. Whelan explores the...

Understanding Cryptography: A Textbook for Students and Practitioners
Understanding Cryptography: A Textbook for Students and Practitioners

Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a...

Foundations of Dependable Computing: Models and Frameworks for Dependable Systems
Foundations of Dependable Computing: Models and Frameworks for Dependable Systems
Foundations of Dependable Computing: Models and Frameworks for Dependable Systems presents two comprehensive frameworks for reasoning about system dependability, thereby establishing a context for understanding the roles played by specific approaches presented in this book's two companion volumes. It then explores the range of models and...
Foundations of Dependable Computing: System Implementation
Foundations of Dependable Computing: System Implementation
Foundations of Dependable Computing: System Implementation, explores the system infrastructure needed to support the various paradigms of Paradigms for Dependable Applications. Approaches to implementing support mechanisms and to incorporating additional appropriate levels of fault detection and fault tolerance at the processor, network, and...
Digital Radio Systems on a Chip - A Systems Approach
Digital Radio Systems on a Chip - A Systems Approach
This book focuses on a specific engineering problem that is and will continue to be important in the forthcoming information age: namely, the need for highly integrated radio systems that can be embedded in wireless devices for various applications, including portable mobile multimedia wireless communications, wireless appliances, digital...
ESL Models and their Application: Electronic System Level Design and Verification in Practice (Embedded Systems)
ESL Models and their Application: Electronic System Level Design and Verification in Practice (Embedded Systems)

This book arises from experience the authors have gained from years of work as industry practitioners in the field of Electronic System Level design (ESL). At the heart of all things related to Electronic Design Automation (EDA), the core issue is one of models: what are the models used for, what should the models contain, and how should they be...

Result Page: 67 66 65 64 63 62 61 60 59 58 57 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy