Home | Amazing | Today | Tags | Publishers | Years | Search 
UMTS Signaling: UMTS Interfaces, Protocols, Message Flows and Procedures Analyzed and Explained
UMTS Signaling: UMTS Interfaces, Protocols, Message Flows and Procedures Analyzed and Explained

UMTS is real. In a continuously growing number of countries we can walk in the stores of mobile network operators or resellers and take UMTS PC cards or even third-generation (3G) phones home and use them instantly. Every day the number of equipments and their feature sets gets broader. The “dream” of multimedia on mobile...

Digital Signal Processing with Field Programmable Gate Arrays (With CD-ROM)
Digital Signal Processing with Field Programmable Gate Arrays (With CD-ROM)

Field-Programmable Gate Arrays (FPGAs) are on the verge of revolutionizing digital signal processing. Novel FPGA families are replacing ASICs and PDSPs for front end digital signal processing algorithms more and more. The efficient implementation of these algorithms is the main goal of this book. It starts with an overview of today's FPGA...

Networks for Grid Applications: Third International ICST Conference, GridNets 2009
Networks for Grid Applications: Third International ICST Conference, GridNets 2009

The GridNets conference is an annual international meeting that provides a focused and highly interactive forum where researchers and technologists have an opportunity to present and discuss leading research, developments, and future directions in grid networking. The goal of this event is to serve as both the premier conference...

Network Performance Engineering: A Handbook on Convergent Multi-Service Networks and Next Generation Internet
Network Performance Engineering: A Handbook on Convergent Multi-Service Networks and Next Generation Internet

During recent years a great deal of progress has been made in performance modelling and evaluation of the Internet, towards the convergence of multi-service networks of diverging technologies, supported by internetworking and the evolution of diverse access and switching technologies. The 44 chapters presented in this handbook are revised...

Software Engineering and Computer Systems, Part II: Second International Conference ICSECS 2011
Software Engineering and Computer Systems, Part II: Second International Conference ICSECS 2011

On behalf of the ICSECS 2011 Program Committee and the Universiti Malaysia Pahang in Kuantan, Pahang, Malaysia, we welcome readers to proceedings of the Second International Conference on Software Engineering and Computer Systems (ICSECS 2011).

ICSECS 2011 explored new advances in software engineering including software...

The Bayesian Choice: From Decision-Theoretic Foundations to Computational Implementation (Springer Texts in Statistics)
The Bayesian Choice: From Decision-Theoretic Foundations to Computational Implementation (Springer Texts in Statistics)

The main purpose of statistical theory is to derive from observations of a random phenomenon an inference about the probability distribution underlying this phenomenon. That is, it provides either an analysis (description) of a past phenomenon, or some predictions about a future phenomenon of a similar nature. In this book, we insist...

Document Security: Protecting Physical and Electronic Content
Document Security: Protecting Physical and Electronic Content

Several electronic layers exist in most documents, a fact overlooked by many writers. Probing these sublayers often reveals information not intended for release by the author. Documents in electronic formats create a “palimpsest” that even semiskilled investigators can probe for sensitive data.

Palimpsest seems...

Advances in Software Engineering: International Conference, ASEA 2010
Advances in Software Engineering: International Conference, ASEA 2010

Welcome to the Proceedings of the 2010 International Conference on Advanced Software Engineering and Its Applications (ASEA 2010) – one of the partnering events of the Second International Mega-Conference on Future Generation Information Technology (FGIT 2010).

ASEA brings together researchers from academia and industry...

Microsoft Access 2010 VBA Programming Inside Out
Microsoft Access 2010 VBA Programming Inside Out

Microsoft Visual Basic for Applications (VBA) is an exceptional programming language and environment. The language has grown out of a need to have a programming language that would allow more business-focused individuals to write programs, but equally support the programming features that developers look for in a product. The...

Cloud Computing Bible
Cloud Computing Bible

In the five months that I have been researching and writing Cloud Computing Bible, it has become clear to me that most people recognize that cloud computing is a big deal, even if they are not really clear why that is so. Every day newspaper and magazine articles and radio and TV stories report on cloud computing. The phrase “in the...

Enterprise Content Management - A Business and Technical Guide
Enterprise Content Management - A Business and Technical Guide

Information is the lifeblood of knowledge, the flotsam of events and perspectives created in every second of history. There is so much to capture and yet so little time and so few resources to make sense of it all. Just as we get tantalisingly close, the holy grail of true knowledge slips further over the horizon.

To capture...

Sams Teach Yourself the Twitter API in 24 Hours (Sams Teach Yourself -- Hours)
Sams Teach Yourself the Twitter API in 24 Hours (Sams Teach Yourself -- Hours)

This book on the Twitter API is geared to the programmer who is just a bit past beginner—who knows the basics of LAMP, including how to set up a basic server, PHP, JavaScript, HTML, and CSS. You do not have to be an expert programmer to use this book, but you should know how to look things up. In writing this book, we have tried...

Result Page: 266 265 264 263 262 261 260 259 258 257 256 255 254 253 252 251 250 249 248 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy