Home | Amazing | Today | Tags | Publishers | Years | Search 
Solar Power for Your Home (Green Guru Guides)
Solar Power for Your Home (Green Guru Guides)

Easy, inexpensive, do-it-yourself solar energy projects

Featuring step-by-step instructions and useful photos and illustrations, this hands-on guide is filled with solar energy solutions you can put to use right away. Solar Power for Your Home shows you how to set up a variety of simple, money-saving solar projects quickly...

Cognitive Radio Networking and Security: A Game-Theoretic View
Cognitive Radio Networking and Security: A Game-Theoretic View

Recent increases in demand for cognitive radio technology have driven researchers and technologists to rethink the implications of the traditional engineering designs and approaches to communications and networking. One issue is that the traditional thinking is that one should try to have more bandwidth, more resources, and more of...

Femtocells: Design & Application
Femtocells: Design & Application

As a cellular standard evolves, there are many variables that must be optimized. A few of these variables are directly related to higher throughput, increased user capacity, and in general improved system performance. The optimization techniques have involved higherorder modulation, improved multiple access (in both time and frequency), more...

Handbook of Approximation Algorithms and Metaheuristics
Handbook of Approximation Algorithms and Metaheuristics

Delineating the tremendous growth in this area, the Handbook of Approximation Algorithms and Metaheuristics covers fundamental, theoretical topics as well as advanced, practical applications. It is the first book to comprehensively study both approximation algorithms and metaheuristics.

Starting with basic approaches, the
...

OECD Information Technology Outlook 2010
OECD Information Technology Outlook 2010

The OECD Information Technology Outlook 2010 has been prepared by the OECD under the guidance of the OECD Committee for Information, Computer and Communications Policy (ICCP), and in particular the Working Party on the Information Economy. This edition is the tenth in a biennial series designed to provide members with a broad overview of...

One-to-One Web Marketing: Build a Relationship Marketing Strategy One Customer at a Time, Second Edition
One-to-One Web Marketing: Build a Relationship Marketing Strategy One Customer at a Time, Second Edition

Markets are becoming increasingly fragmented as the result of global competition. As more companies vie for niche market positions, they spin out a broader array of product and service offerings. The Web, with its relatively low barriers to entry, has accelerated this competition by orders of magnitude. The wide availability of online...

JavaScript for Programmers
JavaScript for Programmers

The practicing programmer’s Deitel® guide to XHTML®, CSS®, JavaScript, XML® and Ajax RIA development.

 

This book applies the...

Analysis and Control of Boolean Networks: A Semi-tensor Product Approach
Analysis and Control of Boolean Networks: A Semi-tensor Product Approach

Analysis and Control of Boolean Networks presents a systematic new approach to the investigation of Boolean control networks. The fundamental tool in this approach is a novel matrix product called the semi-tensor product (STP). Using the STP, a logical function can be expressed as a conventional discrete-time linear system. In the light of...

Desktop Encyclopedia of Voice and Data in Networking
Desktop Encyclopedia of Voice and Data in Networking

The telecommunications industry is changing rapidly in its quest to converge voice and data on high-performance multiservice networks that are designed to meet virtually any business and consumer need. These nextgeneration networks are being driven as much by the revenue-generating potential of new integrated applications as they are by the...

Access to Knowledge in the Age of Intellectual Property
Access to Knowledge in the Age of Intellectual Property

At the end of the twentieth century, intellectual property rights collided with everyday life. Expansive copyright laws and digital rights management technologies sought to shut down new forms of copying and remixing made possible by the Internet. International laws expanding patent rights threatened the lives of millions of people around the...

Microbiologically Safe Foods
Microbiologically Safe Foods

This book focuses on state of the art technologies to produce microbiologically safe foods for our global dinner table.  Each chapter summarizes the most recent scientific advances, particularly with respect to food processing, pre- and post-harvest food safety, quality control, and regulatory information.

The book begins with...

Concurrent Programming on Windows
Concurrent Programming on Windows

“When you begin using multi-threading throughout an application, the importance of clean architecture and design is critical. . . . This places an emphasis on understanding not only the platform’s capabilities but also emerging best practices. Joe does a great job interspersing best practices alongside theory...

Result Page: 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy