Home | Amazing | Today | Tags | Publishers | Years | Search 
Model-Driven Development of Advanced User Interfaces (Studies in Computational Intelligence)
Model-Driven Development of Advanced User Interfaces (Studies in Computational Intelligence)
Model-Driven Development (MDD) has become an important paradigm in software development. The approach claims to provide a solution for systematic and efficient software development for the highly complex systems developed nowadays. It uses models, i.e. abstract representations of certain aspects of a system, as primary artifacts...
Augmented Reality: An Emerging Technologies Guide to AR
Augmented Reality: An Emerging Technologies Guide to AR
Augmented reality (AR) is a technology whose time has come. Conceived in rudimentary form as early as the 1960’s, AR is only now becoming truly practical. Recent advances in mobile processing, coupled with an explosion in digital storage capacity, ubiquity of wireless broadband connections, mass adoption of smart phones, and...
Finite and Algorithmic Model Theory (London Mathematical Society Lecture Note Series, Vol. 379)
Finite and Algorithmic Model Theory (London Mathematical Society Lecture Note Series, Vol. 379)
This volume is based on the satelliteworkshop on Finite and Algorithmic Model Theory that took place at the University of Durham, January 9–13, 2006, to inaugurate the scientific program Logic and Algorithms held at the Isaac Newton Institute for Mathematical Sciences during the first six months of 2006. The goal of the...
Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization
Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization

The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a...

Wireless Networking: Understanding Internetworking Challenges
Wireless Networking: Understanding Internetworking Challenges

This book focuses on providing a detailed and practical explanation of key existing and emerging wireless networking technologies and trends,while minimizing the amount of theoretical background information. The book also goes beyond simply presenting what the technology is, but also examines why the technology is the way it is, the history...

Introducing Geographic Information Systems with ArcGIS: A Workbook Approach to Learning GIS
Introducing Geographic Information Systems with ArcGIS: A Workbook Approach to Learning GIS

An integrated approach that combines essential GIS background with a practical workbook on applying the principles in ArcGIS 10.0 and 10.1

Introducing Geographic Information Systems with ArcGISintegrates a broad introduction to GIS with a software-specific workbook for Esri's ArcGIS. Where most courses make do...

Models and Analysis for Distributed Systems (ISTE)
Models and Analysis for Distributed Systems (ISTE)
Verification and hence modeling are a mandatory but intricate problem for engineers developing embedded distributed real-time systems that are entrusted with critical safety applications like medical care, transportation, energy production, industrial processes, military operations. Therefore, while emerging 40 years ago, first for...
Computing Networks: From Cluster to Cloud Computing (ISTE)
Computing Networks: From Cluster to Cloud Computing (ISTE)

“Computing Networks” explores the core of the new distributed computing infrastructures we are using today:  the networking systems of clusters, grids and clouds. It helps network designers and distributed-application developers and users to better understand the technologies, specificities, constraints and benefits of these...

Resource Allocation in Wireless Networks: Theory and Algorithms
Resource Allocation in Wireless Networks: Theory and Algorithms

The wireless industry is in the midst of a fundamental shift from providing voice-only services to offering customers an array of multimedia services, including a wide variety of audio, video and data communications capabilities. Future wireless networks will be integrated into every aspect of daily life, and therefore could affect our life...

Analyzing the Analyzers: An Introspective Survey of Data Scientists and Their Work
Analyzing the Analyzers: An Introspective Survey of Data Scientists and Their Work

There has been intense excitement in recent years around activities labeled "data science," "big data," and "analytics." However, the lack of clarity around these terms and, particularly, around the skill sets and capabilities of their practitioners has led to inefficient communication between "data...

Web Application Architecture: Principles, Protocols and Practices
Web Application Architecture: Principles, Protocols and Practices

In-depth examination of concepts and principles of Web application development

Completely revised and updated, this popular book returns with coverage on a range of new technologies. Authored by a highly respected duo, this edition provides an in-depth examination of the core concepts and general principles of Web application...

Multi-Objective Swarm Intelligent Systems: Theory & Experiences (Studies in Computational Intelligence)
Multi-Objective Swarm Intelligent Systems: Theory & Experiences (Studies in Computational Intelligence)
Recently, a new class of heuristic techniques, the swarm intelligence has emerged. In this context, more recently, biologists and computer scientists in the field of “artificial life” have been turning to insects for ideas that can be used for heuristics. Many aspects of the collective activities of social insects,...
Result Page: 134 133 132 131 130 129 128 127 126 125 124 123 122 121 120 119 118 117 116 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy