Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Fractal Structure of Data Reference: Applications to the Memory Hierarchy
The Fractal Structure of Data Reference: Applications to the Memory Hierarchy
For purposes of understanding its performance, a computer system is traditionally viewed as a processor coupled to one or more disk storage devices, and driven by externally generated requests (typically called transactions). Over the past several decades, very powerful techniques have become available to the performance analyst attempting to...
Frommer's Cambodia & Laos (Frommer's Complete)
Frommer's Cambodia & Laos (Frommer's Complete)

This new first edition guide introduces two exotic destinations fast becoming required stops for globetrotting tourists. Through our expert author, readers are exposed to the rich culture and poignant history in Cambodia and Laos. Discover the region's food and gift markets, lovely beaches and islands, colorful temples, and charming...

My New iPad: A User's Guide
My New iPad: A User's Guide

The iPad is cute. It's lovable. It's fun to play with. And it's a bit mysterious.

My New iPad is your guide to getting more from your new iPad, Apple's latest magical creation. You'll learn how to do the things you want to do right now—like surf the Internet, send email, listen to music,...

Handbook of Plastic Optics
Handbook of Plastic Optics

This volume is the only book to describe in detail all aspects of plastic optics from design issues to production technology and quality control aspects. Throughout, the focus is firmly set on practical applications, making this an indispensable source of information for all those working in optics research and development.

Topics...

Blender 2.5 Lighting and Rendering
Blender 2.5 Lighting and Rendering

Each chapter develops a different aspect of a Blender technique. The book is essentially a step-by-step tutorial, which builds up your knowledge throughout. It has practical examples such as lighting a tricycle in open space, lighting a wine bottle on a table, and lighting a room that has a lamp as well as sunlight coming in through the...

Mobile Positioning and Tracking: From Conventional to Cooperative Techniques
Mobile Positioning and Tracking: From Conventional to Cooperative Techniques

This book presents the most recent state of the art in mobile positioning and tracking techniques.

This book discusses mobile positioning solutions applied on top of current wireless communication networks. In addition, the authors introduce advanced and novel topics such as localization in heterogeneous and cooperative...

Computer and Information Sciences: Proceedings of the 25th International Symposium on Computer and Information Sciences
Computer and Information Sciences: Proceedings of the 25th International Symposium on Computer and Information Sciences

Computer and Information Sciences is a unique and comprehensive review of advanced technology and research in the field of Information Technology. It provides an up to date snapshot of research in Europe and the Far East (Hong Kong, Japan and China) in the most active areas of information technology, including Computer Vision, Data...

Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)

Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.

The Information Security...

Bioinformatics: The Machine Learning Approach, Second Edition (Adaptive Computation and Machine Learning)
Bioinformatics: The Machine Learning Approach, Second Edition (Adaptive Computation and Machine Learning)

We have been very pleased, beyond our expectations, with the reception of the first edition of this book. Bioinformatics, however, continues to evolve very rapidly, hence the need for a new edition. In the past three years, fullgenome sequencing has blossomed with the completion of the sequence of the fly and the first draft of the...

Computer Aided and Integrated Manufacturing Systems, Vol. 1: Computer Techniques
Computer Aided and Integrated Manufacturing Systems, Vol. 1: Computer Techniques

This is an invaluable five-volume reference on the very broad and highly significant subject of computer aided and integrated manufacturing systems. It is a set of distinctly titled and well-harmonized volumes by leading experts on the international scene.

The techniques and technologies used in computer aided and integrated...

Secure Coding in C and C++
Secure Coding in C and C++

"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append...

Algorithms and Computation: 11th International Conference, ISAAC 2000, Taipei, Taiwan
Algorithms and Computation: 11th International Conference, ISAAC 2000, Taipei, Taiwan
The papers in this volume were selected for presentation at the Eleventh Annual International Symposium on Algorithms and Computation (ISAAC 2000), held on 18{20 December, 2000 at the Institute of Information Science, Academia Sinica, Taipei, Taiwan. Previous meetings were held in Tokyo (1990), Taipei (1991), Nagoya (1992),...
unlimited object storage image
Result Page: 955 954 953 952 951 950 949 948 947 946 945 944 943 942 941 940 939 938 937 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy