Home | Amazing | Today | Tags | Publishers | Years | Search 
FPGA Design: Best Practices for Team-based Design
FPGA Design: Best Practices for Team-based Design

In August of 2006, an engineering VP from one of Altera’s customers approached Misha Burich, VP of Engineering at Altera, asking for help in reliably being able to predict the cost, schedule and quality of system designs reliant on FPGA designs.

At this time, I was responsible for defining the design flow requirements for...

Digital Preservation for Heritages: Technologies and Applications
Digital Preservation for Heritages: Technologies and Applications

Cultural heritages include rich information related to social, historical and cultural values. Affected by climate, environmental and other factors, some valuable heritage information is threatened through destruction or disappearance, and some is still not utilized sufficiently. How to investigate and utilize such information...

Energy Minimization Methods in Computer Vision and Pattern Recognition: 8th International Conference, EMMCVPR 2011
Energy Minimization Methods in Computer Vision and Pattern Recognition: 8th International Conference, EMMCVPR 2011

Over the last few decades, energy minimization methods have become an established paradigm to resolve a variety of challenges in the fields of computer vision and pattern recognition. While traditional approaches to computer vision were often based on a heuristic sequence of processing steps and merely allowed a very limited...

Mac OS X Lion Pocket Guide
Mac OS X Lion Pocket Guide

With the addition of features and multi-touch gestures first pioneered on the iPhone and iPad, Lion is truly different than any other Mac OS. This handy guide is packed with concise information to help you quickly get started with Lion, whether you're new to the Mac or a longtime user. Once you learn the essentials, you can use...

Pro Access 2010 Development
Pro Access 2010 Development

Microsoft Access is a unique platform that enables rapid development of database applications. It has been a long-time favorite of both developers and end users for creating single-user and small-scale office automation solutions. Recent improvements have made it a viable choice for enterprise-class applications as well. In this book,...

Head First iPhone and iPad Development: A Learner's Guide to Creating Objective-C Applications for the iPhone and iPad
Head First iPhone and iPad Development: A Learner's Guide to Creating Objective-C Applications for the iPhone and iPad

Let's say you have a killer app idea for iPhone and iPad. Where do you begin? Head First iPhone and iPad Development will help you get your first application up and running in no time. You'll not only learn how to design for Apple's devices, you'll also master the iPhone SDK tools -- including Interface...

Blender 2.5 HOTSHOT
Blender 2.5 HOTSHOT

With Blender 2.5 Hotshot you will take a tour around Blender 3D tools and discover the tight integration between them by working on projects covering many aspects of computer image generation, modeling, lighting, compositing, animation, and the game engine.

Using a projects based approach you will learn fun and challenging...

The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

Boring, boring, boring. Isn’t this what immediately comes to mind when one sees books on foundational concepts of information security? Monotonous coverage of theory, dry details of history, brief yet inadequate coverage of every topic known to man, even though you know that you’ll never be hired by the NSA as a...

Droid 2 For Dummies (Computer/Tech)
Droid 2 For Dummies (Computer/Tech)

Don’t be fooled: Just because the Droid 2 is a smartphone doesn’t mean that it’s harboring some form of insidious intelligence. There’s no alien brain in the device. It isn’t going to take over the world, though it can intimidate you — that is, until you understand and accept that it’s your...

iOS 4 in Action: Examples and Solutions for iPhone & iPad
iOS 4 in Action: Examples and Solutions for iPhone & iPad

When I started playing with the first-generation iPhone back in 2008, I was amazed by the simplicity and versatility of the smart phone. With the iPhone in hand, I could take pictures, navigate with GPS, tell time, and of course, play games—especially when I was bored while waiting in line at the DMV for my license plate....

IPv6 Security
IPv6 Security

Internet Protocol version 6 (IPv6) is the next version of the protocol that is used for communications on the Internet. IPv6 is a protocol that has been in existence for many years, but it has not yet replaced IPv4. IPv4 has some limitations that were not anticipated when it was first created. Because IPv6 overcomes many of these...

Oracle PeopleSoft Enterprise Financial Management 9.1 Implementation
Oracle PeopleSoft Enterprise Financial Management 9.1 Implementation

PeopleSoft financial applications have been recognized as a leading ERP product across a wide range of industries that help organizations automate their accounting operations, cut costs, and streamline business processes. They offer industry leading solutions for organizations' global needs, however complex they may be.

...

Result Page: 767 766 765 764 763 762 761 760 759 758 757 756 755 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy