 |
|
|
|
 Swarm Intelligence in Data Mining (Studies in Computational Intelligence)Science is a swarm.
To the layperson, the stereotypical scientist is logical, clear-thinking, wellinformed but perhaps socially awkward, carefully planning his or her experiments and then analyzing the resulting data deliberately, with precision. The scientist works alone, emotion-free, searching only for truth, having been well advised... |  |  Secure Roaming in 802.11 Networks (Communications Engineering)WLAN users want to remain connected to the network as they move from place to place in an office building, airport, library, etc. But the original 802.11 standard was not designed to support roaming. However, enhancements to the 802.11 now make it possible to add reliable, secure roaming capabilities to any 802.11-based WLAN. This thorough guide... |  |  Designing Embedded Processors: A Low Power PerspectiveAs we embrace the world of personal, portable, and perplexingly complex digital systems, it has befallen upon the bewildered designer to take advantage of the available transistors to produce a system which is small, fast, cheap and correct, yet possesses increased functionality.
Increasingly, these systems have to consume little energy.... |
|
 EndNote 1 - 2 - 3 Easy!: Reference Management for the ProfessionalReference management is the process of storing, managing, retrieving, and citing references from various sources. Learning effective reference management is critically important for healthcare and biomedical professionals as it is a major component of the process of scientific manuscript writing. Effective reference management is also useful for... |  |  |  |  Securing Java: Getting Down to Business with Mobile Code, 2nd EditionInformation Security/Java "This book is mandatory reading for every user and developer of Webware." —Peter G. Neumann, Moderator of the Risks Forum, from his review of the first edition Securing Java Java security is more important now than ever before. As Java matures and moves into the enterprise, security takes a more prominent... |
|
| Result Page: 5 4 3 2 1 |