Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wireless Sensor and Actuator Networks: Algorithms and Protocols for Scalable Coordination and Data Communication
Wireless Sensor and Actuator Networks: Algorithms and Protocols for Scalable Coordination and Data Communication

A mixture of theory, experiments, and simulations that provide qualitative and quantitative insights into the technology

The important new technology of wireless sensor and actuator networks provides radically new communication and networking paradigms with many new applications. Wireless Sensor and Actuator Networks...

Emerging Web Services Technology, Volume II (Whitestein Series in Software Agent Technologies and Autonomic Computing)
Emerging Web Services Technology, Volume II (Whitestein Series in Software Agent Technologies and Autonomic Computing)
This 2nd volume on Emerging Web Services Technologies continues to follow the current research activities in the areas of Web Services and Service Oriented Architectures. By collecting the proceedings of the second Workshop of Emerging Web Services Technology 2007 it contains many examples of promising research activities...
Models and Analysis for Distributed Systems (ISTE)
Models and Analysis for Distributed Systems (ISTE)
Verification and hence modeling are a mandatory but intricate problem for engineers developing embedded distributed real-time systems that are entrusted with critical safety applications like medical care, transportation, energy production, industrial processes, military operations. Therefore, while emerging 40 years ago, first for...
Digitalization Cases: How Organizations Rethink Their Business for the Digital Age (Management for Professionals)
Digitalization Cases: How Organizations Rethink Their Business for the Digital Age (Management for Professionals)

This book presents a rich compilation of real-world cases on digitalization, the goal being to share first-hand insights from respected organizations and to make digitalization more tangible. As virtually every economic and societal sector is now being challenged by emerging technologies, the digital economy is a highly...

Information-Theoretic Methods in Data Science
Information-Theoretic Methods in Data Science
Learn about the state-of-the-art at the interface between information theory and data science with this first unified treatment of the subject. Written by leading experts in a clear, tutorial style, and using consistent notation and definitions throughout, it shows how information-theoretic methods are being used in data acquisition, data...
XML and Java: Developing Web Applications, Second Edition
XML and Java: Developing Web Applications, Second Edition

Fully revised to cover the latest standards and technologies, XML and Java(TM), Second Edition provides the practical solutions developers need to design powerful and portable Web-based applications. Featuring step-by-step examples, this book focuses on harnessing the power of Java(TM) and XML...

Going Virtual: Distributed Communities of Practice
Going Virtual: Distributed Communities of Practice
This text describes how more subtle kinds of knowledge can be managed in a distributed international environment. It also describes work in the field of knowledge management, with a specific focus on the management of knowledge .

Going Virtual: Distributed Communities of Practice contributes to the understanding of how more...

The Psychology of Entertainment Media: Blurring the Lines Between Entertainment and Persuasion
The Psychology of Entertainment Media: Blurring the Lines Between Entertainment and Persuasion
The Psychology of Entertainment Media provides a cutting-edge look at how entertainment media affects its viewers, both in intended and unintended ways, and the psychological processes that underlie these effects. The collection represents an international, multidisciplinary investigation of an age-old process--persuasion--in a relatively...
Information Warfare: How to Survive Cyber Attacks
Information Warfare: How to Survive Cyber Attacks

"Computers don't attack computers, people do. With Erbschloe's capability taxonomy, we see that there are plenty of new adversaries out there with increasingly powerful cyberweapons and intentions. But most importantly, the greatest threat still comes from "trusted" insiders we so desperately need to, but perhaps shouldn't, trust...

Semiconductors and the Information Revolution: Magic Crystals that made IT Happen
Semiconductors and the Information Revolution: Magic Crystals that made IT Happen
This book sets out to explain the development of modern electronic systems and devices from the viewpoint of the semiconductor materials (germanium, silicon, gallium arsenide and many others) which made them possible. It covers the scientific understanding of these materials and its intimate relationship with their technology and many applications....
What Is Nanotechnology and Why Does It Matter: From Science to Ethics
What Is Nanotechnology and Why Does It Matter: From Science to Ethics

Ongoing research in nanotechnology promises both innovations and risks, potentially and profoundly changing the world. This book helps to promote a balanced understanding of this important emerging technology, offering an informed and impartial look at the technology, its science, and its social impact and ethics.

Gamification by Design: Implementing Game Mechanics in Web and Mobile Apps
Gamification by Design: Implementing Game Mechanics in Web and Mobile Apps

Gamification may be a new term, but the idea of using game-thinking and game mechanics to solve problems and engage audiences isn’t exactly new. The military has been using games and simulations for hundreds (if not thousands) of years, and the U.S. military has been a pioneer in the use of video games across branches. Three...

unlimited object storage image
Result Page: 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 93 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy