Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Sequence Data Mining (Advances in Database Systems)
Sequence Data Mining (Advances in Database Systems)
Sequences are an important type of data which occur frequently in many scientific, medical, security, business and other applications. For example, DNA sequences encode the genetic makeup of humans and all species, and protein sequences describe the amino acid composition of proteins and encode the structure and function of...
Distributed Programming Paradigms with Cryptography Applications
Distributed Programming Paradigms with Cryptography Applications
This monograph describes a programming methodology based upon programming paradigms and generic programs and demonstates how distributed application programs can be developed by simple substitution of data structures and sequential procedures. The author introduces generic programs for two paradigms and shows how to derive new distributed programs...
Mobile Image Communication Using JPEG2000
Mobile Image Communication Using JPEG2000
This thesis is concerned with image communication considering all stages from the beginning to the very end. In order to appropriately handle large raster imagery, the fundamental goal is to reduce the influence of the most limiting factors in mobile environments. In a clear departure from the traditional strategies, this goal is reached by...
Cellular Authentication for Mobile and Internet  Services
Cellular Authentication for Mobile and Internet Services
An invaluable reference discussing the Generic Authentication   Architecture (GAA), its infrastructure, usage and integration into existing networks

Cellular Authentication for Mobile and Internet Services introduces the reader into the field of secure communication for mobile applications, including secure...

Knowledge and Data Management in GRIDs
Knowledge and Data Management in GRIDs
From the reviews:

"This edited book is an early attempt by primarily European researchers to harness and expand the use of grid technologies in accessing distributed sources for sharing, and also to extract and produce knowledge. … Overall, the book is well organized and the selected material represents a very interesting range of...

David Busch's Compact Field Guide for the Canon EOS Rebel T3i/600D
David Busch's Compact Field Guide for the Canon EOS Rebel T3i/600D

Throw away your cheat-sheets and command cards! Are you tired of squinting at tiny color-coded tables on fold-out camera cards? Do you wish you had the most essential information extracted from my comprehensive David Busch’s Canon EOS Rebel T3i/600D Guide to Digital SLR Photography in a size you could tuck away in your camera...

Mosby's Dental Drug Reference, 10e
Mosby's Dental Drug Reference, 10e

Ideal for chairside use by the entire dental team, Mosby's Dental Drug Reference provides guidelines for safe, accurate drug administration. More than 800 drug monographs make it easy to find indications and dosages, contraindications, interactions, side effects, serious reactions, and dental-specific drug information. With...

Migrating to IPv6: A Practical Guide to Implementing IPv6 in Mobile and Fixed Networks
Migrating to IPv6: A Practical Guide to Implementing IPv6 in Mobile and Fixed Networks
Exhaustion of address space and global routing table growth necessitate important revisions to the current version of the Internet Protocol, IPv4. IP version 6 offers greater address space and additional features to support the evolving requirements of Internet applications. Deployed alongside current IPv4 networks, IPv6 will restore the...
Mastering Rust: Learn about memory safety, type system, concurrency, and the new features of Rust 2018 edition, 2nd Edition
Mastering Rust: Learn about memory safety, type system, concurrency, and the new features of Rust 2018 edition, 2nd Edition

Become proficient in designing, developing and deploying effective software systems using the advanced constructs of Rust

Key Features

  • Improve your productivity using the latest version of Rust and write simpler and easier code
  • Understand Rust's immutability and...
Cisco Wireless LAN Security
Cisco Wireless LAN Security

Cisco Wireless LAN Security is an in-depth guide to wireless LAN technology and security, introducing the key aspects of 802.11 security by illustrating major wireless LAN (WLAN) standards that can protect the entire network. Because a WLAN is less effective as an isolated piece of the...

The UML Profile for Framework Architectures
The UML Profile for Framework Architectures

The UML community has begun to define a series of 'profiles' which better suit the needs of UML-users within specific domains, settings or technologies.

The UML Profile for Framework Architectures provides a UML profile for object and component frameworks. It shows how to describe framework architectures and to support...

Routing, Flow, and Capacity Design in Communication and Computer Networks
Routing, Flow, and Capacity Design in Communication and Computer Networks
"Pioro and Medhis book is very refreshing and gives a comprehensive view of network design. It unifies many important topics on network design that are not found in one place; for example, this book provides the first thorough treatment of multi-layer design. Practitioners will find the book useful due to its development of both models and...
unlimited object storage image
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy