Home | Amazing | Today | Tags | Publishers | Years | Search 
Human-in-the-Loop Simulations: Methods and Practice
Human-in-the-Loop Simulations: Methods and Practice

Both the editors of this book were exposed to human-in-the-loop simulations while pursuing their doctoral degrees in the Center for Human-Machine Systems at Georgia Tech. In fact, S. Narayanan served as Ling Rothrock’s teaching assistant for the simulation course taught by Prof. Christine Mitchell. It has been over 15 years...

Political Transformations and Public Finances: Europe, 1650-1913 (Political Economy of Institutions and Decisions)
Political Transformations and Public Finances: Europe, 1650-1913 (Political Economy of Institutions and Decisions)

How did today's rich states first establish modern fiscal systems? To answer this question, Political Transformations and Public Finances by Mark Dincecco examines the evolution of political regimes and public finances in Europe over the long term. The book argues that the emergence of efficient fiscal institutions was the result of two...

Programming Many-Core Chips
Programming Many-Core Chips

Parallel computing has been confined, for much of its over 40 year history, to highly specialized, technology-wise advanced domains such as scientific computing or telecommunications. There were only a few experts who had the background and experience to write efficient, robust and scalable programs for these parallel machines.

...

Computer Methods for Analysis of Mixed-Mode Switching Circuits
Computer Methods for Analysis of Mixed-Mode Switching Circuits

Mixed-mode switching circuits distinguish themselves from other circuits by including switches that are either clocked externally or controlled internally. These circuits have found broad applications in telecommunication networks, instrumentation, and power electronic systems, to name a few. It is the emergence of switched capacitor...

An Introduction to Modern Mathematical Computing: With Maple(TM)
An Introduction to Modern Mathematical Computing: With Maple(TM)

Thirty years ago mathematical, as opposed to applied numerical, computation was difficult to perform and so relatively little used. Three threads changed that: the emergence of the personal computer; the discovery of fiber-optics and the consequent development of the modern internet; and the building of the Three “M’s”...

The Coming Robot Revolution: Expectations and Fears About Emerging Intelligent, Humanlike Machines
The Coming Robot Revolution: Expectations and Fears About Emerging Intelligent, Humanlike Machines

Making a robot that looks and behaves like a human being has been the subject of many popular science fiction movies and books. Although the development of such a robot faces many challenges, the making of a virtual human has long been potentially possible. With recent advances in various key technologies related to hardware and...

Web Application Security: Iberic Web Application Security Conference, IBWAS 2009
Web Application Security: Iberic Web Application Security Conference, IBWAS 2009

IBWAS 2009, the Iberic Conference on Web Applications Security, was the first international conference organized by both the OWASP Portuguese and Spanish chapters in order to join the international Web application security academic and industry communities to present and discuss the major aspects of Web applications security.

...

Sams Teach Yourself Shell Programming in 24 Hours (2nd Edition)
Sams Teach Yourself Shell Programming in 24 Hours (2nd Edition)

In recent years, the UNIX operating system has seen a huge boost in its popularity, especially with the emergence of Linux. For programmers and users of UNIX, this comes as no surprise: UNIX was designed to provide an environment that’s powerful yet easy to use.

One of the main strengths of UNIX is that it comes with a...

Innovative Tools for Business Coalitions in B2B Applications
Innovative Tools for Business Coalitions in B2B Applications

One of the most debated consequences regarding the increased availability and use of information and communication technologies (ICTs), especially since the early 1990s, have been their impact on economic growth. Generally speaking, ICT can serve to reduce transaction costs at all levels of a commercial transaction. With the emergence...

Managing Web Usage in the Workplace: A Social, Ethical, and Legal Perspective
Managing Web Usage in the Workplace: A Social, Ethical, and Legal Perspective

The ubiquitous nature of the Internet is dramatically revolutionizing the manner in which organizations and individuals share information. Developed out of necessity during the cold war, the Internet was created as a means to help governmental institutions and collegiate institutions send documents and research materials electronically...

Enterprise Cloud Computing: Technology, Architecture, Applications
Enterprise Cloud Computing: Technology, Architecture, Applications

In today’s world virtually all available information on any technical topic is just a few clicks away on the web. This is especially true of an emerging area such as cloud computing. So why write a book, and, who should read this book and why?

Every few years a new ‘buzzword’ becomes the rage of the...

Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2011, Beijing, China, July 9, 2011
Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2011, Beijing, China, July 9, 2011

concerned with the study of the development and use of advanced information technologies and systems for national, international, and societal security-related applications. In the past few years,we have witnessed that ISI experienced tremendous growth and attracted significant interest involving academic researchers in related fields...

Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy