Home | Amazing | Today | Tags | Publishers | Years | Search 
Web Dragons: Inside the Myths of Search Engine Technology
Web Dragons: Inside the Myths of Search Engine Technology
In the eye-blink that has elapsed since the turn of the millennium, the lives of those of us who work with information have been utterly transformed. Pretty well all we need to know is on the web; if not today, then tomorrow. Its where we learn and play, shop and do business, keep up with old friends and meet new ones. What makes it possible for us...
Wireless OFDM Systems: How to make them work? (Engineering and Computer Science)
Wireless OFDM Systems: How to make them work? (Engineering and Computer Science)
"This book...gives a comprehensive overview of the implementation of OFDM systems. It capitalizes on the large experience of the authors with the implementation of OFDM based WLAN system. For those who study or work on broadband communication in a wireless multipath environment, this book is a useful and easy-to-read reference..." ...
Computational Inverse Techniques in Nondestructive Evaluation
Computational Inverse Techniques in Nondestructive Evaluation
Although many books on inverse problems already exist, they can be quite mathematical in nature and pay little attention to practical applications. This book forms a bridge between the theoretical foundations and practical applications of nondestructive evaluation methods. With unique emphasis on inverse problems in solid mechanics, it describes in...
Information Technology for Counterterrorism: Immediate Actions and Futures Possibilities
Information Technology for Counterterrorism: Immediate Actions and Futures Possibilities
Immediately following the events of September 11, 2001, the National Academies (including the National Academy of Sciences, the National Academy of Engineering, the Institute of Medicine, and the National Research Council) offered its services to the nation to formulate a scientific and technological response to the challenges posed by emerging...
Advanced Computational Intelligence Paradigms in Healthcare - 1 (Studies in Computational Intelligence)
Advanced Computational Intelligence Paradigms in Healthcare - 1 (Studies in Computational Intelligence)
This book presents some of the most recent research results on the applications of computational intelligence in healthcare. The contents include: Information model for management of clinical content; State-based model for management of type II diabetes; Case-based reasoning in medicine; Assessing the quality of care in artificial intelligence...
Spatial Augmented Reality: Merging Real and Virtual Worlds
Spatial Augmented Reality: Merging Real and Virtual Worlds

Like virtual reality, augmented reality is becoming an emerging platform in new application areas for museums, edutainment, home entertainment, research, industry, and the art communities using novel approaches which have taken augmented reality beyond traditional eye-worn or hand-held displays.

In this book, the authors discuss spatial...

BlackBerry Pearl For Dummies (Computer/Tech)
BlackBerry Pearl For Dummies (Computer/Tech)
Manage your contacts, appointments, e-mail, and media

Find out how to do a string of things with your BlackBerry Pearl!

It's a fact — your BlackBerry Pearl can do almost anything except bake a pie — but you can use it to e-mail a recipe!

This friendly...

IMS Multimedia Telephony over Cellular Systems: VoIP Evolution in a Converged Telecommunication World
IMS Multimedia Telephony over Cellular Systems: VoIP Evolution in a Converged Telecommunication World
IMS Multimedia Telephony service has been standardized in 3GPP as the replacement of the circuit switched telephony service in cellular networks. The multimedia telephony service consists of several service components such as voice, video and text. ‘IMS Multimedia Telephony over Cellular Systems’ provides a comprehensive overview of the...
RFID-A Guide to Radio Frequency Identification
RFID-A Guide to Radio Frequency Identification
This book provides an introduction to RFID technology. It describes and addresses the following: How RFID works, how it is and can be used in current and future applications. The History of RFID technology, the current state of practice and where RFID is expected to be taken in the future. The role of middleware software to route data between the...
Designing BSD Rootkits: An Introduction to Kernel Hacking
Designing BSD Rootkits: An Introduction to Kernel Hacking
Designing BSD Rootkits introduces the fundamentals of programming and developing rootkits under the FreeBSD operating system. In addition to explaining rootkits and rootkit writing, the book aims to inspire readers to explore the FreeBSD kernel and gain a better understanding of the kernel and the FreeBSD operating system itself. Unlike...
Use Case Driven Object Modeling with UML: Theory and Practice
Use Case Driven Object Modeling with UML: Theory and Practice
Use Case Driven Object Modeling with UML&emdash;Theory and Practice shows how to drive an object-oriented software design from use case all the way through coding and testing, based on the minimalist, UML-based ICONIX process. In addition to a comprehensive explanation of the foundations of the approach, the book makes extensive use of...
Dictionary of Applied Math for Engineers and Scientists (Comprehensive Dictionary of Mathematics)
Dictionary of Applied Math for Engineers and Scientists (Comprehensive Dictionary of Mathematics)
Clear, concise definitions of mathematical terms are not easy to locate, and despite the seemingly close connections between math and other scientific and engineering fields, practical explanations comprehensible to those who are not primarily mathematicians are even more difficult to find. The Dictionary of Applied Mathematics for Engineers and...
Result Page: 347 346 345 344 343 342 341 340 339 338 337 336 335 334 333 332 331 330 329 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy