Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...
Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...

Multiplexed networks are essential for the unified, efficient and cost-effective exchange of electronic information within embedded component systems. This is especially important in automotive manufacturing as vehicles become increasingly reliant on robust electronic networks and systems for improved reliability, anti-lock brake systems (ABS),...

New Directions of Modern Cryptography
New Directions of Modern Cryptography

Modern cryptography has evolved dramatically since the 1970s. With the rise of new network architectures and services, the field encompasses much more than traditional communication where each side is of a single user. It also covers emerging communication where at least one side is of multiple users. New Directions of Modern...

BDD in Action: Behavior-driven development for the whole software lifecycle
BDD in Action: Behavior-driven development for the whole software lifecycle

Summary

BDD in Action teaches you the Behavior-Driven Development model and shows you how to integrate it into your existing development process. First you'll learn how to apply BDD to requirements analysis to define features that focus your development efforts on underlying business goals. Then,...

Veterinary Virology, Third Edition
Veterinary Virology, Third Edition

Completely rewritten, this edition has expanded coverage of zoonotic viruses and the diseases they cause, and viruses and viral diseases of laboratory animals, poultry, fish, and wildlife. The concept of new emerging and reemerging viral diseases reflects the new perspective this concept has brought to veterinary and zoonotic virology and...

Introduction to Semiconductor Devices: For Computing and Telecommunications Applications
Introduction to Semiconductor Devices: For Computing and Telecommunications Applications

This volume offers a solid foundation for understanding the most important devices used in the hottest areas of electronic engineering today, from semiconductor fundamentals to state-of-the-art semiconductor devices in the telecommunications and computing industries. Kevin Brennan describes future approaches to computing hardware and RF power...

Innovation, Technology, and Market Ecosystems: Managing Industrial Growth in Emerging Markets
Innovation, Technology, and Market Ecosystems: Managing Industrial Growth in Emerging Markets
This edited book brings together international insights for raising rich discussion on industrial growth in the twenty-first century with a focus on the Industry 4.0 drive in the global marketplace, which is driven by innovations, technology, and digital drives. It delineates multiple impacts on business-to-business, business-to-consumers, the...
Leading Transformative Change Collectively
Leading Transformative Change Collectively

This book directly helps decision-makers and change agents in companies, NGOs, and government bodies become more proficient in transformative, collaborative change in realizing the SDGs.

This practitioner’s handbook translates a systemic – and enlivening – approach to collaboration into day-to-day work...

Security and Usability: Designing Secure Systems That People Can Use
Security and Usability: Designing Secure Systems That People Can Use

Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them.

...
Network Infrastructure Security
Network Infrastructure Security
Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure...
Uncertainty and Intelligent Information Systems
Uncertainty and Intelligent Information Systems
Intelligent systems are necessary to handle modern computer-based technologies managing information and knowledge. This book discusses the theories required to help provide solutions to difficult problems in the construction of intelligent systems. Particular attention is paid to situations in which the available information and data may be...
Beyond Constructivism: Models and Modeling Perspectives on Mathematics Problem Solving, Learning, and Teaching
Beyond Constructivism: Models and Modeling Perspectives on Mathematics Problem Solving, Learning, and Teaching
This book evolved out of research that began more than 25 years ago, based on a National Science Foundation-supported project investigating the question: what is needed, beyond having a mathematical idea that enables students to use it in everyday problem-solving situations! (Lesh, Landau, & Hamilton, 1983). Large portions...
Ontology Matching
Ontology Matching

Ontologies tend to be found everywhere. They are viewed as the silver bullet for many applications, such as database integration, peer-to-peer systems, e-commerce, semantic web services, or social networks. However, in open or evolving systems, such as the semantic web, different parties would, in general, adopt different ontologies. Thus,...

unlimited object storage image
Result Page: 130 129 128 127 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy