|
|
|
|
|
|
Rough Computing: Theories, Technologies and ApplicationsRough set theory is a new soft computing tool which deals with vagueness and uncertainty. It has attracted the attention of researchers and practitioners worldwide, and has been successfully applied to many fields such as knowledge discovery, decision support, pattern recognition, and machine learning.
Rough Computing: Theories,... | | Worldwide Wi-Fi: Technological Trends and Business StrategiesYour success guide to the next wireless revolution
The next watershed innovation in wireless technology is here: IEEE 802.11 wireless local area networks (LANs).
Recent studies from IDC indicate that the Wi-Fi wireless LAN market will likely account for ninety percent of projected LAN equipment revenues by... | | CCIE Wireless Exam (350-050) Quick Reference
With the introduction of wireless LAN (WLAN), IP networks are now also available for those applications on which wired technologies are not suitable or no wired connectivity is available at all. The following are a few wireless use cases:
-
Home ISP connectivity: Consumer products
-
Building-to-building...
|
|
Concepts of Programming Languages (7th Edition)Concepts of Programming Languages describes the fundamental concepts of programming languages by presenting design issues, examining design choices, and critically comparing design alternatives without being language specific. This book is appropriate for anyone who wants to compare and contrast various programming languages.
... | | | | Modern Cryptography: Theory and PracticeLeading HP security expert Wenbo Mao explains why "textbook" crypto schemes, protocols, and systems are profoundly vulnerable by revealing real-world-scenario attacks. Next, he shows how to realize cryptographic systems and protocols that are truly "fit for application"--and formally demonstrates their fitness. Mao presents... |
|
|
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 |