|
|
|
|
|
Information Theory and Reliable CommunicationThis book is designed primarily for use as a first-year graduate text in information theory, suitable for both engineers and mathematicians. It is assumed that the reader has some understanding of freshman calculus and elementary probability, and in the later chapters some introductory random process theory. Unfortunately there is one more... | | | | Advanced Software Engineering: Expanding the Frontiers of Software TechnologyThis volume presents proceedings from the 19th IFIP World Computer Congress in Santiago, Chile. The proceedings of the World Computer Congress are a product of the gathering of 2,000 delegates from more than 70 countries to discuss a myriad of topics in the ICT domain. Of particular note, this marks the first time that a World Computer Congress has... |
|
| | Professional Xen VirtualizationXen is an open source virtualization technology that allows multiple operating systems to run on a single physical computer system, providing cost savings and increased efficiency. This book presents you with a complete foundation on this exciting technology and shows you how Xen virtualization offers faster response times for new server and... | | XHTML EssentialsWith Web access becoming available through TV, handheld devices, and even phones, developers need to create sites that can be viewed from different environments, not just from the desktop. Introducing XHTML, the next generation HTML, this practical guide jumpstarts Web developers on the technology that ensures that their Web pages stay true-to-form... |
|
Augmented Learning: Research and Design of Mobile Educational GamesNew technology has brought with it new tools for learning, and research has shown that the educational potential of video games resonates with scholars, teachers, and students alike. In Augmented Learning, Eric Klopfer describes the largely untapped potential of mobile learning games--games played on such handheld devices as cell phones,... | | Handbook of Computer Crime Investigation: Forensic Tools & TechnologyComputers can be used in virtually any type of crime, ranging from cyberstalking and child pornography to financial fraud, espionage and terrorism. The Handbook of Computer crime investigation presents detailed technical information that can be used to help solve these crimes.
Following on the success of his introductory text, Digital... | | Collaborative Geographic Information SystemsMany advances in the integration of group spatial modeling, geographic information systems (GIS), and the Internet have occurred in recent years; however, there is a lack of materials to highlight the transdisciplinary characteristics and impacts of this convergence while providing a uniform and consistent treatment of this expanding field of... |
|
|
Result Page: 922 921 920 919 918 917 916 915 914 913 912 911 910 909 908 907 906 905 904 |