Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services. 

AAA and Network Security for Mobile Access is an invaluable guide to the AAA concepts and framework, including its...

Quantum Computer Science (Synthesis Lectures on Quantum Computing)
Quantum Computer Science (Synthesis Lectures on Quantum Computing)
In this text we present a technical overview of the emerging field of quantum computation along with new research results by the authors. What distinguishes our presentation from that of others is our focus on the relationship between quantum computation and computer science. Specifically, our emphasis is on the computational model of quantum...
IT Services Portfolio Management Best Practice Handbook
IT Services Portfolio Management Best Practice Handbook

If you support an organization that wants to improve the performance of complex IT portfolios to achieve both immediate and strategic goals or are responsible for and oversee many projects that are contractually required to produce measurable results; you will be pleased to find that this book serves as both a roadmap and a checklist for...

Medical Computer Vision: Recognition Techniques and Applications in Medical Imaging
Medical Computer Vision: Recognition Techniques and Applications in Medical Imaging

The Workshop on Medical Computer Vision (MICCAI-MCV 2010) was held in conjunction with the 13th International Conference on Medical Image Computing and Computer – Assisted Intervention (MICCAI 2010) on September 20, 2010 in Beijing, China. The one-day workshop focused on recognition techniques and applications in medical imaging. The...

Algorithm-Architecture Matching for Signal and Image Processing
Algorithm-Architecture Matching for Signal and Image Processing

Advances in signal and image processing together with increasing computing power are bringing mobile technology closer to applications in a variety of domains like automotive, health, telecommunication, multimedia, entertainment and many others. The development of these leading applications, involving a large diversity of algorithms...

Pediatric Infectious Diseases Revisited (Birkh?user Advances in Infectious Diseases)
Pediatric Infectious Diseases Revisited (Birkh?user Advances in Infectious Diseases)
In both industrialized and developing countries, childhood immunization has become one of the most important and cost-effective public health interventions. National immunization programs have prevented millions of deaths since WHO initiated the ‘Expanded Program on Immunization’ in 1974. Smallpox was eradicated in 1979,...
Compilation and Synthesis for Embedded Reconfigurable Systems: An Aspect-Oriented Approach
Compilation and Synthesis for Embedded Reconfigurable Systems: An Aspect-Oriented Approach

This book provides techniques to tackle the design challenges raised by the increasing diversity and complexity of emerging, heterogeneous architectures for embedded systems. It describes an approach based on techniques from software engineering called aspect-oriented programming, which allow designers to control today’s sophisticated...

Nutrigenomics and Nutrigenetics in Functional Foods and Personalized Nutrition
Nutrigenomics and Nutrigenetics in Functional Foods and Personalized Nutrition

While functional foods have become a reasonably well-established concept, personalized nutrition is still treated with skepticism by many. The recognition that people would have different nutrient requirements, or perceive foods in different ways, raises several concerns―some real, some not so real. Nutrigenomics and...

Developing Online Games: An Insider's Guide
Developing Online Games: An Insider's Guide

A soup-to-nuts overview of just what it takes to successfully design, develop and manage an online game. Learn from the top two online game developers through the real-world successes and mistakes not known to others. There are Case studies from 10+ industry leaders, including Raph Koster, J. Baron, R. Bartle, D. Schubert, A....

RFID-A Guide to Radio Frequency Identification
RFID-A Guide to Radio Frequency Identification
This book provides an introduction to RFID technology. It describes and addresses the following: How RFID works, how it is and can be used in current and future applications. The History of RFID technology, the current state of practice and where RFID is expected to be taken in the future. The role of middleware software to route data between the...
Intelligent Databases: Technologies and Applications
Intelligent Databases: Technologies and Applications
Computer-based information technologies have been extensively used to help many organizations, private companies, and academic and education institutions manage their processes and information systems hereby become their nervous center. Information systems are used to manage data. The explosion of massive data sets created by businesses, science...
Adjudicating Climate Change: State, National, and International Approaches
Adjudicating Climate Change: State, National, and International Approaches
The world’s political process has been slow to react to the serious, and potentially catastrophic, consequences for life on our planet that flow from the burning of fossil fuel. In one sense, this is understandable: turning around the global energy base is not a simple task. In another sense, it is inexcusable: a myopic failure to act in the...
unlimited object storage image
Result Page: 107 106 105 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 89 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy