Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Queueing Modelling Fundamentals: With Applications in Communication Networks
Queueing Modelling Fundamentals: With Applications in Communication Networks

Queueing analysis is a vital tool used in the evaluation of system performance. Applications of queueing analysis cover a wide spectrum from bank automated teller machines to transportation and communications data networks.

Fully revised, this second edition of a popular book contains the significant addition of a new chapter on...

Pro Asynchronous Programming with .NET
Pro Asynchronous Programming with .NET

Pro Asynchronous Programming with .NET teaches the essential skill of asynchronous programming in .NET. It answers critical questions in .NET application development, such as: how do I keep my program responding at all times to keep my users happy? how do I make the most of the available hardware? how can I improve performance?

...
Ansible Playbook Essentials
Ansible Playbook Essentials

Design automation blueprints using Ansible's playbooks to orchestrate and manage your multitier infrastructure

About This Book

  • Get to grips with Ansible's features such as orchestration, automatic node discovery, and data encryption
  • Create data-driven, modular and reusable...
Traffic and Granular Flow  '11
Traffic and Granular Flow '11

This book continues the biannual series of conference proceedings, which has become a classical reference resource in traffic and granular research alike. It addresses new developments at the interface between physics, engineering and computational science. Complex systems, where many simple agents, be they vehicles or particles, give rise to...

Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities...
Integration-Ready Architecture and Design: Software Engineering with XML, Java, .NET, Wireless, Speech, and Knowledge Technologies
Integration-Ready Architecture and Design: Software Engineering with XML, Java, .NET, Wireless, Speech, and Knowledge Technologies
One might think that the software industry is performing very well because it is armed with object-oriented approaches, Web services, Java and .NET technologies, and so forth. Unfortunately, this is not true.

There may be something wrong with the way we write programs. The process has not changed much during the past twenty years, except
...
Ultrasonic Nondestructive Evaluation: Engineering and Biological Material Characterization
Ultrasonic Nondestructive Evaluation: Engineering and Biological Material Characterization
Most books on ultrasonic nondestructive evaluation (NDE) focus either on its theoretical background or on advanced applications. Furthermore, information on the most current applications, such as guided wave techniques and acoustic microscopy, is scattered throughout various conference proceedings and journals. No one book has integrated these...
Intraocular Tumors
Intraocular Tumors
This book aims to cover all aspects of intraocular tumors. The chapters explain diagnosis and treatment plan in detail with the aid of step-by-step descriptions in the form of flow charts. An additional chapter covers imaging modalities that help in diagnosing these conditions. The book is written by subject experts from all over the world....
Modeling Structured Finance Cash Flows with MicrosoftВ Excel: A Step-by-Step Guide (Wiley Finance)
Modeling Structured Finance Cash Flows with MicrosoftВ Excel: A Step-by-Step Guide (Wiley Finance)
A practical guide to building fully operational financial cash flow models for structured finance transactions

Structured finance and securitization deals are becoming more commonplace on Wall Street. Up until now, however, market participants have had to create their own models to analyze these deals, and new entrants have...

Artifical Intelligence for Human Computing: ICMI 2006 and IJCAI 2007 International Workshops, Banff, Canada, November 3, 2006 Hyderabad
Artifical Intelligence for Human Computing: ICMI 2006 and IJCAI 2007 International Workshops, Banff, Canada, November 3, 2006 Hyderabad
This volume in the Lecture Notes of Artificial Intelligence represents the first book on human computing. We introduced the notion of human computing in 2006 and organized two events that were meant to explain this notion and the research conducted worldwide in the context of this notion.

The first of these events
...
Software Abstractions : Logic, Language, and Analysis
Software Abstractions : Logic, Language, and Analysis
Software is built on abstractions. Pick the right ones, and programming
will flow naturally from design; modules will have small and simple interfaces;
and new functionality will more likely fit in without extensive
reorganization. Pick the wrong ones, and programming will be a series
of nasty surprises: interfaces will become
...
Practical JBossВ® Seam Projects
Practical JBossВ® Seam Projects

Practical JBoss® Seam Projects, written by renowned author and enterprise Java practitioner Jim Farley, is expected to be the first practical projects book of its kind on this groundbreaking open source lightweight JSF-EJB3 framework.

  • Practical application scenarios are used to demonstrate the nature of the...
unlimited object storage image
Result Page: 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy