Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Self-Similar Processes in Telecommunications
Self-Similar Processes in Telecommunications

For the first time the problems of voice services self-similarity are discussed systematically and in detail with specific examples and illustrations.

‘Self-Similar Processes in Telecommunications’ considers the self-similar (fractal and multifractal) models of telecommunication traffic and efficiency...

Spatial Data on the Web: Modeling and Management
Spatial Data on the Web: Modeling and Management
Spatial data is essential in a wide range of application domains today. While geographical applications remain the key target area, spatial properties are required in other contexts such as computer-aided design, robotics and image processing. Associated with these is the constantly growing number of distributed processing architectures, based on,...
X Internet: The Executable and Extendable Internet
X Internet: The Executable and Extendable Internet
Evolving from the current PSTN to Internet Telephony is not an easy task. … The two authors [of this book] are uniquely qualified to explain how this evolution can be architected. … Both authors have used their unique expertise to produce this very first book on the topic.
-From the Foreword by Roch Glitho, Ph.D.,
...
Digital Integrated Circuits: Analysis and Design
Digital Integrated Circuits: Analysis and Design
This is a well-written solid engineering oriented book … an excellent book for a first course which concentrates on digital electronics at the transistor level.
-IEEE Circuits and Systems Magazine, Vol. 4, No. 4, 2004

…Ayers discusses a wide range of topics-each properly arranged, concisely explained, and clearly
...
Computational Intelligence and Feature Selection: Rough and Fuzzy Approaches (IEEE Press Series on Computational Intelligence)
Computational Intelligence and Feature Selection: Rough and Fuzzy Approaches (IEEE Press Series on Computational Intelligence)
This book provides readers with the background and fundamental ideas behind Feature Selection (FS), with an emphasis on techniques based on rough and fuzzy sets. For readers who are less familiar with the subject, the book begins with an introduction to fuzzy set theory and fuzzy-rough set theory. Next it provides a critical review of FS methods...
Designing Network Security
Designing Network Security

A practical guide to creating a secure network infrastructure

* Understand basic cryptography and security technologies
* Identify the threats and common attacks to a network infrastructure
* Learn how to create a security policy
* Find out how to recover from a security breach
* Study specific implementation
...

Rough Computing: Theories, Technologies and Applications
Rough Computing: Theories, Technologies and Applications
Rough set theory is a new soft computing tool which deals with vagueness and uncertainty. It has attracted the attention of researchers and practitioners worldwide, and has been successfully applied to many fields such as knowledge discovery, decision support, pattern recognition, and machine learning.

Rough Computing: Theories,...

Worldwide Wi-Fi: Technological Trends and Business Strategies
Worldwide Wi-Fi: Technological Trends and Business Strategies

Your success guide to the next wireless revolution

The next watershed innovation in wireless technology is here: IEEE 802.11 wireless local area networks (LANs).

Recent studies from IDC indicate that the Wi-Fi wireless LAN market will likely account for ninety percent of projected LAN equipment revenues by...

CCIE Wireless Exam (350-050) Quick Reference
CCIE Wireless Exam (350-050) Quick Reference

With the introduction of wireless LAN (WLAN), IP networks are now also available for those applications on which wired technologies are not suitable or no wired connectivity is available at all. The following are a few wireless use cases:

  • Home ISP connectivity: Consumer products
  • Building-to-building...
Concepts of Programming Languages (7th Edition)
Concepts of Programming Languages (7th Edition)
Concepts of Programming Languages describes the fundamental concepts of programming languages by presenting design issues, examining design choices, and critically comparing design alternatives without being language specific. This book is appropriate for anyone who wants to compare and contrast various programming languages.

...
Millimetre Wave Antennas for Gigabit Wireless Communications: A Practical Guide to Design and Analysis in a System Context
Millimetre Wave Antennas for Gigabit Wireless Communications: A Practical Guide to Design and Analysis in a System Context

Complete and comprehensive application-focused reference on millimetre wave antennas

Millimetre Wave Antennas for Gigabit Wireless Communications covers a vast wealth of material with a strong focus on the current design and analysis principles of millimetre wave antennas for wireless...

Modern Cryptography: Theory and Practice
Modern Cryptography: Theory and Practice
Leading HP security expert Wenbo Mao explains why "textbook" crypto schemes, protocols, and systems are profoundly vulnerable by revealing real-world-scenario attacks. Next, he shows how to realize cryptographic systems and protocols that are truly "fit for application"--and formally demonstrates their fitness. Mao presents...
unlimited object storage image
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy