Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cells and Robots: Modeling and Control of Large-Size Agent Populations (Springer Tracts in Advanced Robotics)
Cells and Robots: Modeling and Control of Large-Size Agent Populations (Springer Tracts in Advanced Robotics)
From the reviews:

"This interesting monograph is devoted to the study of multi-agent, populations of biological cells and robot teams. … The main objective of the approach is to provide solutions to the problem of how dynamics of an individual agent propagates to the population dynamics. … This original monograph has a wide...

802.11 WLANs and IP Networking: Security, QoS, and Mobility
802.11 WLANs and IP Networking: Security, QoS, and Mobility
Even after all the earthly riches are enjoyed there still remains in the heart a
longing for knowledge, true knowledge. It is this longing and the desire to bring
the knowledge to others that resulted in the revelation of this book.

“How do IEEE 802.11 wireless local area networks (WLANs) work together
with the
...
Protocols and Architectures for Wireless Sensor Networks
Protocols and Architectures for Wireless Sensor Networks
Wireless sensor networks will revolutionise applications such as environmental monitoring, home automation, and logistics.

Protocols and Architectures for Wireless Sensor Networks provides a thorough description of the most important issues and questions that have to be addressed in a wireless sensor network....

Point-Based Graphics (Morgan Kaufmann Series in Computer Graphics and Geometric Modeling)
Point-Based Graphics (Morgan Kaufmann Series in Computer Graphics and Geometric Modeling)
This book will present the latest research results in point-based computer graphics. After an overview of the key issues, affordable 3D scanning devices will be discussed and new concepts for the mathematical representation of point-sampled shapes will be presented. Then the authors will describe methods for high-performance and high-quality...
Digital Communication over Fading Channels: A Unified Approach to Performance Analysis
Digital Communication over Fading Channels: A Unified Approach to Performance Analysis
Regardless of the branch of science or engineering, theoreticians have always been enamored with the notion of expressing their results in the form of closed-form expressions. Quite often, the elegance of the closed-form solution is overshadowed by the complexity of its form and the difficulty in evaluating it numerically. In such instances, one...
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance

Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with...

Antenna Design for Mobile Devices (Wiley - IEEE)
Antenna Design for Mobile Devices (Wiley - IEEE)

Expanded and updated, this practical guide is a one-stop design reference containing all an engineer needs when designing antennas

  • Integrates state-of-the-art technologies with a special section for step-by-step antenna design
  • Features up-to-date bio-safety and electromagnetic compatibility regulation...
Resource Management in Wireless Networking
Resource Management in Wireless Networking

This is the first book that provides readers with a deep technical overview of recent advances in resource management for wireless networks at different layers of the protocol stack. The subject is explored in various wireless networks, such as ad hoc wireless networks, 3G/4G cellular, IEEE 802.11, and Bluetooth personal area networks.

...
Verilog and SystemVerilog Gotchas: 101 Common Coding Errors and How to Avoid Them
Verilog and SystemVerilog Gotchas: 101 Common Coding Errors and How to Avoid Them

This book will help engineers write better Verilog/SystemVerilog design and verification code as well as deliver digital designs to market more quickly. It shows over 100 common coding mistakes that can be made with the Verilog and SystemVerilog languages. Each example explains in detail the symptoms of the error, the languages rules that...

Semantic Models for Multimedia Database Searching and Browsing (Advances in Database Systems)
Semantic Models for Multimedia Database Searching and Browsing (Advances in Database Systems)
Semantic Models for Multimedia Database Searching and Browsing begins with the introduction of multimedia information applications, the need for the development of the multimedia database management systems (MDBMSs), and the important issues and challenges of multimedia systems. The temporal relations, the spatial relations, the spatio-temporal...
Usability: Turning Technologies into Tools
Usability: Turning Technologies into Tools
"The book contains much insight." --B. Hazeltine, Computing Reviews

"Unusual in that the research it brings together spans the perspectives of cognitive psychology, the sociology of work and technology, work-oriented systems design, computer-supported cooperative work, and human-computer interaction. Although most of
...
Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The wide variety of methods used in terrorism informatics are...
unlimited object storage image
Result Page: 43 42 41 40 39 38 37 36 35 34 33 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy