Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Handbook of Information Systems Research
The Handbook of Information Systems Research
This book provides a fresh perspective on issues related to IS research by providing chapters from world-renowned leaders in IS research along with chapters from relative newcomers who bring some interesting and often new perspectives to IS research.

The field of information systems research is undergoing subtle changes as it seeks to...

XPath 2.0 Programmer's Reference (Programmer to Programmer)
XPath 2.0 Programmer's Reference (Programmer to Programmer)
From its origins as a sublanguage of XSLT, XPath has come into its own as a key element of XML. XPath 2.0 has emerged as a robust language twice the size of its predecessor, complex and capable of standing on its own.

This substantive volume, by the editor of the W3C® XSLT 2.0 specification, is the authoritative reference on XPath 2.0. It...

Quality of Telephone-Based Spoken Dialogue Systems
Quality of Telephone-Based Spoken Dialogue Systems
An increasing number of telephone services are offered in a fully automatic way with the help of speech technology. The underlying systems, called spoken dialogue systems (SDSs), possess speech recognition, speech understanding, dialogue management, and speech generation capabilities, and enable a more-or-less natural spoken interaction with the...
.NET Mobile Web Developer's Guide
.NET Mobile Web Developer's Guide
The .NET Mobile Web Developer's Guide provides a solid foundation for developing mobile applications using Microsoft technologies. With a focus on using ASP.NET and the .NET Mobile Internet Toolkit, .NET Mobile Web Developer's Guide will give you the insight to use Microsoft technologies for developing mobile applications. This book will also show...
Microsoft Internet Security and Acceleration (ISA) Server 2004 Unleashed
Microsoft Internet Security and Acceleration (ISA) Server 2004 Unleashed
Hit the ground running with the detailed, road-tested deployment scenarios featured in Microsoft Internet Security and Acceleration (ISA) Server 2004 Unleashed. Written by best-selling authors Michael Noel, who has been involved with the early beta of ISA Server 2004, and ...
Innovation in Information Technology
Innovation in Information Technology
The health of the computer science field and related disciplines has
been an enduring concern of the National Research Council’s Computer  cience and Telecommunications Board (CSTB). From its first reports in the late 1980s, CSTB has examined the nature, conduct, scope, and directions of the research that drives innovation in
...
Malware Detection (Advances in Information Security)
Malware Detection (Advances in Information Security)

Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly dependent on information systems. These two factors have exposed our critical infrastructures to malicious attacks and accidental failures. Many...

Issues and Trends in Technology and Human Interaction (Advances in Technology and Human Interaction)
Issues and Trends in Technology and Human Interaction (Advances in Technology and Human Interaction)
purposes of humans. It often has unintended and unexpected effects on humans and can be used for purposes other than originally planned. While technology cannot exist without humans, one can equally well argue that humans cannot exist without technology. This relationship touches on many fundamental questions of anthropology, ontology, and...
Advances in Artificial Intelligence -- IBERAMIA 2004: 9th Ibero-American Conference on AI, Puebla, Mexico, November 22-26, 2004
Advances in Artificial Intelligence -- IBERAMIA 2004: 9th Ibero-American Conference on AI, Puebla, Mexico, November 22-26, 2004
This book constitutes the refereed proceedings of the 9th Ibero-American Conference on Artificial Intelligence, IBERAMIA 2004, held in Puebla, Mexico in November 2004.

The 97 revised full papers presented were carefully reviewed and selected from 304 submissions. The papers are organized in topical sections on distributed AI and multi-agent...

Schaum's Outline of Data Structures with Java, Second Edition
Schaum's Outline of Data Structures with Java, Second Edition
Like other Schaum’s Outlines, this book is intended to be used primarily for self study. It is suitable as a study guide in a course on data structures using the Java programming language. In American universities, this is typically the second course in the computer science major. The book is also serves well as a reference on data structures...
50 Fast Final Cut Express Techniques
50 Fast Final Cut Express Techniques
"If you are looking to maximize Final Cut Express, you won’t find

a better guide than Tim Meehan."
—Dan Jahn, President, The Raven Group

Whether creating dynamite digital videos is your profession or just your obsession, Final Cut Express can enhance your projects. In this richly illustrated volume,...

Algebraic Theory of Automata Networks (SIAM Monographs on Discrete Mathematics and Applications, 11)
Algebraic Theory of Automata Networks (SIAM Monographs on Discrete Mathematics and Applications, 11)
This self-contained monograph covers the foundations of what is currently known about automata networks, giving the reader sufficient theoretical background to be at the forefront of research in many related areas. Alexandra Kireeva, Mathematical Reviews

Algebraic Theory of Automata Networks investigates automata networks as
...
unlimited object storage image
Result Page: 811 810 809 808 807 806 805 804 803 802 801 800 799 798 797 796 795 794 793 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy