Home | Amazing | Today | Tags | Publishers | Years | Search 
M Commerce: Technologies, Services, and Business Models
M Commerce: Technologies, Services, and Business Models
Presenting the first book ever to provide a complete introduction to m-Commerce!

Mobile Commerce, or m-Commerce, is part of an explosion of new usage scenarios that overcome the limitations of mobile devices in support of highly personalized and time-critical activities for consumers and enterprises alike. With tens of millions
...
Bluetooth Application Programming with the Java APIs Essentials Edition (The Morgan Kaufmann Series in Networking)
Bluetooth Application Programming with the Java APIs Essentials Edition (The Morgan Kaufmann Series in Networking)
Bluetooth wireless technology is a short-range radio standard that provides new opportunities for wireless devices. Originally, Bluetooth wireless technology was designed as a way of eliminating the cables attached to nearly all consumer electronic devices. However, the goals for Bluetooth wireless technology grew as its designers recognized that...
Basic Concepts for Managing Telecommunications Networks: Copper to Sand to Glass to Air (Network and Systems Management)
Basic Concepts for Managing Telecommunications Networks: Copper to Sand to Glass to Air (Network and Systems Management)
It is important to understand what came before and how to meld new products with legacy systems. Network managers need to understand the context and origins of the systems they are using. Programmers need an understanding of the reasons behind the interfaces they must satisfy and the relationship of the software they build to the whole...
Security for Wireless Sensor Networks (Advances in Information Security)
Security for Wireless Sensor Networks (Advances in Information Security)
From the reviews:

 

"Security for Wireless Sensor Networks provides a detailed overview of wireless sensor security issues, describing techniques for protecting networks and the results of recent studies in wireless sensor network security. Aimed at network security researchers and designers, this volume takes a high-level...

Testing of Digital Systems
Testing of Digital Systems
The fraction of the industrial semiconductor budget that manufacturing-time testing consumes continues to rise steadily. It has been known for quite some time that tackling the problems associated with testing semiconductor circuits at earlier design levels significantly reduces testing costs. Thus, it is important for hardware designers to be...
Pattern Recognition Technologies and Applications: Recent Advances (Premier Reference Source)
Pattern Recognition Technologies and Applications: Recent Advances (Premier Reference Source)
The nature of handwriting in our society has significantly altered over the ages due to the introduction of new technologies such as computers and the World Wide Web. With increases in the amount of signature verification needs, state of the art internet and paper-based automated recognition methods are necessary.

Pattern Recognition...

Pattern Recognition, Second Edition
Pattern Recognition, Second Edition
Pattern recognition is becoming increasingly important in the age of automation and information handling and retrieval.
This book provides the most comprehensive treatment available of pattern recognition, from an engineering perspective. Developed through more than ten years of teaching experience, Pattern Recognition is appropriate for both
...
Computer Based Design and Manufacturing (Manufacturing Systems Engineering)
Computer Based Design and Manufacturing (Manufacturing Systems Engineering)
As industry adopts a consumer focus in its product development strategy, it offers broader product ranges, shorter model lifetimes, and the ability to process orders in arbitrary lot sizes. This offers the ability to conduct early product design and development trade-off analysis among these competing objectives. The use of information technologies...
Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia
Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia
Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with...
The Martian Principles for Successful Enterprise Systems: 20 Lessons Learned from NASAs Mars Exploration Rover Mission
The Martian Principles for Successful Enterprise Systems: 20 Lessons Learned from NASAs Mars Exploration Rover Mission
When you need to land and operate a robot on Mars, "halfway" software is not an option. While helping to develop the Collaborative Information Portal, or CIP, for NASA's Mars Exploration Rover mission, Ronald Mak identified and refined a set of principles that represent the fundamental goals necessary for any successful enterprise system....
Applied Software Measurement
Applied Software Measurement

Effectively forecast, manage, and control software across the entire project lifecycle

Accurately size, estimate, and administer software projects with real-world guidance from an industry expert. Fully updated to cover the latest tools and techniques, Applied Software Measurement, Third Edition details how to...

Comprehensive Functional Verification: The Complete Industry Cycle (Systems on Silicon)
Comprehensive Functional Verification: The Complete Industry Cycle (Systems on Silicon)
As designs increase in complexity, so has the value of verification engineers within the hardware design team. In fact, the need for skilled verification engineers has grown dramatically--functional verification now consumes between 40 and 70% of a project's labor, and about half its cost. Currently there are very few books on verification for...
Result Page: 294 293 292 291 290 289 288 287 286 285 284 283 282 281 280 279 278 277 276 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy