Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Multi-Carrier and Spread Spectrum Systems
Multi-Carrier and Spread Spectrum Systems
Multi-Carrier and Spread Spectrum Systems describes and analyses the basic concepts of the combination of multi-carrier transmission with spread spectrum (MC-SS). The various architectures and the different detection strategies are examined in some depth. Techniques for capacity and flexibility enhancement of multi-carrier systems such as...
Acting in an Uncertain World: An Essay on Technical Democracy (Inside Technology)
Acting in an Uncertain World: An Essay on Technical Democracy (Inside Technology)
Controversies over such issues as nuclear waste, genetically modified organisms, asbestos, tobacco, gene therapy, avian flu, and cell phone towers arise almost daily as rapid scientific and technological advances create uncertainty and bring about unforeseen concerns. The authors of Acting in an Uncertain World argue that political...
Unifying Theories of Programming and Formal Engineering Methods: International Training School on Software Engineering, Held at ICTAC 2013, Shanghai, ... Lectures (Lecture Notes in Computer Science)
Unifying Theories of Programming and Formal Engineering Methods: International Training School on Software Engineering, Held at ICTAC 2013, Shanghai, ... Lectures (Lecture Notes in Computer Science)

This book presents 5 tutorial lectures by leading researchers given at the ICTAC 2013 Software Engineering School on Unifying Theories of Programming and Formal Engineering Methods, held in Shanghai, China in August 2013.The lectures are aimed at postgraduate students, researchers, academics, and industrial engineers. They cover topics such...

User-Centered Design Stories: Real-World UCD Case Studies (Interactive Technologies)
User-Centered Design Stories: Real-World UCD Case Studies (Interactive Technologies)

Intended for both the student and the practitioner, this is the first user-centered design casebook. It follows the Harvard Case study method, where the reader is placed in the role of the decision-maker in a real-life professional situation. In this book, the reader is asked to perform analysis of dozens of UCD work situations and propose...

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws

This book is a practical guide to discovering and exploiting security flaws in web applications. By “web applications” we mean those that are accessed using a web browser to communicate with a web server. We examine a wide variety of different technologies, such as databases, file systems, and web services, but only in the context...

Computational Intelligence: Methods and Techniques
Computational Intelligence: Methods and Techniques
This book focuses on various techniques of computational intelligence, both single ones and those which form hybrid methods. Those techniques are today commonly applied issues of artificial intelligence, e.g. to process speech and natural language, build expert systems and robots. The first part of the book presents methods of knowledge...
Pro SharePoint 2013 App Development
Pro SharePoint 2013 App Development

Apps have taken the world by storm, and now they're taking SharePoint as well. The biggest new thing in SharePoint 2013, apps are the solution to creating custom code that runs on not just your own SharePoint deployment, but also on others' implementations as well.

Pro SharePoint 2013 App Development is your...

Streptomyces in Nature and Medicine: The Antibiotic Makers
Streptomyces in Nature and Medicine: The Antibiotic Makers

This is an insiders account of 50 years of genetic studies of the soil-inhabiting microbes that produce most of the antibiotics used to treat infections, as well as anti-cancer, anti-parasitic and immunosuppressant drugs. The book begins by describing how these microbes the actinomycetes were discovered in the latter part of the nineteenth...

FlexSim in Academe: Teaching and Research (EcoProduction)
FlexSim in Academe: Teaching and Research (EcoProduction)

This book describes a variety of teaching and academic research applications that effectively utilize FlexSim to: (1) provide guidelines, methods and tools for simulation modeling and analysis in a variety of educational settings and (2) address a variety of important design and operational issues in industry. Simulation is...

Broadband Internet: Access, Regulation and Policy
Broadband Internet: Access, Regulation and Policy
The internet has become so widespread that such issues as access, regulation and related policies have become major factors in the economy and social fabric of societies in every part of the world. Peoples without running water are demanding access to the internet and those without it are becoming deprived citizens. This new book examines current...
Advanced Chain Maille Jewelry Workshop: Weaving with Rings and Scale Maille
Advanced Chain Maille Jewelry Workshop: Weaving with Rings and Scale Maille

Chain maille patterns and weaves that take jewelry design into new frontiers!

Jewelry artists will enjoy a collection of new, less-common weaves and challenging projects that inspire and educate.

Author Karen Karon begins by reviewing basic chain maille weaves in order to set the stage for the more complex...

Theory and Practice of Uncertain Programming
Theory and Practice of Uncertain Programming
Real-life decisions are usually made in the state of uncertainty (randomness, fuzziness, roughness, etc.). How do we model optimization problems in uncertain environments? How do we solve these models? In order to answer these questions, this book provides a self-contained, comprehensive and up-to-date presentation of uncertain programming theory....
unlimited object storage image
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy