Home | Amazing | Today | Tags | Publishers | Years | Search 
Tribology in Machine Design
Tribology in Machine Design
Tribology in Machine Design explains the role of tribology in the design of machine elements. It shows how algorithms developed from the basic principles of tribology can be used in a range of practical applications within mechanical devices and systems.

The computer offers today's designer the possibility of greater stringency of
...
Build Your Own Combat Robot
Build Your Own Combat Robot
Experience the excitement of building your own champion battling bot!

Build a powerful and invincible robot--for full-blown competition or just for fun--using this authoritative robot resource. This team of experts gives you an inside look at the innovative new world of robotic combat, explaining the origins of the sport as well as all the...

Objects, Agents, and Features: International Seminar, Dagstuhl Castle, Germany, February 16-21, 2003, Revised and Invited Papers
Objects, Agents, and Features: International Seminar, Dagstuhl Castle, Germany, February 16-21, 2003, Revised and Invited Papers
This book is the outcome of an international research seminar on objects, agents, and features held at Dagstuhl Castle, Germany in February 2003.

In recent years, concepts in object-oriented modeling and programming have been extended in variuos directions, giving rise to new paradigms such as agent-orientation and feature orientation. This...

Optimizing and Testing WLANs
Optimizing and Testing WLANs
As WLANs (Wireless Local Area Networks) become increasingly common, its becoming vital to be able to test them for proper performance and to optimize their operation. This book, written by a member of the IEEE committee that develops WLAN standards, is the first book addressing that need. It covers test equipment and methods for the RF (wireless)...
Network Analysis, Architecture, and Design, Third Edition (The Morgan Kaufmann Series in Networking)
Network Analysis, Architecture, and Design, Third Edition (The Morgan Kaufmann Series in Networking)
Traditionally, networking has had little or no basis in analysis or architectural development, with designers relying on technologies they are most familiar with or being influenced by vendors or consultants. However, the landscape of networking has changed so that network services have now become one of the most important factors to the success of...
Wi-Fi Telephony: Challenges and Solutions for Voice over WLANs (Communications Engineering Series)
Wi-Fi Telephony: Challenges and Solutions for Voice over WLANs (Communications Engineering Series)
Wi-Fi telephony is the latest, most cost effective, and clearest way of carrying voice data wirelessly. The great news is that it can be integrated seamlessly into the same infrastructures as currently used for computer and telephone data.The digital quality is far above current cellular technologies.

This book will be among the first to
...
Structural Analysis with Finite Elements
Structural Analysis with Finite Elements

Structural Analysis with Finite Elements, 2nd Edition provides a solid introduction to the foundation and the application of the finite element method in structural analysis. It offers new theoretical insight and practical advice on why finite element results are 'wrong,' why support reactions are relatively accurate, why stresses at...

Computer Network Time Synchronization: The Network Time Protocol
Computer Network Time Synchronization: The Network Time Protocol
This book is all about wrangling a herd of network computers so that all display the correct time. This may seem like a really narrow business, but the issues go far beyond winding the clock on your display taskbar. Carefully coordinated, reliable, and accurate time is vital for traffic control in the air and on the ground, buying and selling...
How to Cheat at Microsoft Vista Administration
How to Cheat at Microsoft Vista Administration
The Perfect Reference for the Multitasked SysAdmin
The Microsoft Windows Vista operating system offers several changes and improvements over its predecessors. It not only brings a new and redesigned interface, but also improves on many administrative utilities and management consoles. It also enhances the systems reliability,
...
Scalable and Secure Internet Services and Architecture
Scalable and Secure Internet Services and Architecture
Scalable and Secure Internet Services and Architecture provides an in-depth analysis of many key scaling technologies. Topics include: server clusters and load balancing; QoS-aware resource management; server capacity planning; Web caching and prefetching; P2P overlay network; mobile code and security; and mobility support for adaptive grid...
Business Process Management: Concepts, Languages, Architectures
Business Process Management: Concepts, Languages, Architectures
Business process management is usually treated from two different perspectives: business administration and computer science. While business administration professionals tend to consider information technology as a subordinate aspect for experts to handle, by contrast computer scientists often consider business goals and organizational regulations...
Graph -Theoretic Techniques for Web Content Mining (Machine Perception and Artificial Intelligence)
Graph -Theoretic Techniques for Web Content Mining (Machine Perception and Artificial Intelligence)
Graphs are mathematical constructs for representing objects or systems which contain structural (i.e. relationship) information. Graphs have been used in many domains, from software engineering to artificial intelligence. However, the use of graphs in machine learning has been limited, compared to the more prevalent vector model which does not...
Result Page: 356 355 354 353 352 351 350 349 348 347 346 345 344 343 342 341 340 339 338 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy