Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Software Networks: Virtualization, SDN, 5G and Security (Networks & Telecommunication: Advanced Networks)
Software Networks: Virtualization, SDN, 5G and Security (Networks & Telecommunication: Advanced Networks)

The goal of this book is to describe new concepts for Internet next generation. This architecture is based on virtual networking using Cloud and datacenters facilities. Main problems concern 1) the placement of virtual resources for opening a new network on the fly, and 2) the urbanisation of virtual resource implemented on physical network...

Nonlinear Digital Filtering with Python: An Introduction
Nonlinear Digital Filtering with Python: An Introduction

Nonlinear Digital Filtering with Python: An Introduction discusses important structural filter classes including the median filter and a number of its extensions (e.g., weighted and recursive median filters), and Volterra filters based on polynomial nonlinearities. Adopting both structural and behavioral approaches in characterizing...

Design of Low-Power Coarse-Grained Reconfigurable Architectures
Design of Low-Power Coarse-Grained Reconfigurable Architectures

Coarse-grained reconfigurable architecture (CGRA) has emerged as a solution for flexible, application-specific optimization of embedded systems. Helping you understand the issues involved in designing and constructing embedded systems, Design of Low-Power Coarse-Grained Reconfigurable Architectures offers new frameworks for...

Dictionary of Computer Acronyms and Abbreviations: Plus File Name Extensions (Words R Us Computer Dictionaries) (Volume 2)
Dictionary of Computer Acronyms and Abbreviations: Plus File Name Extensions (Words R Us Computer Dictionaries) (Volume 2)
This Companion Volume to our Dictionary of Computer and Internet Terms (Vol.2) - Dictionary of Computer Acronyms and Abbreviations, has 4,300 terms. It also includes a section on file name extensions with 38,000 entries showing the most commonly used extensions and their association with various software systems. Volume 1 contains over 32,000...
Fixed Mobile Convergence Handbook
Fixed Mobile Convergence Handbook

Requirements for next generation networks (NGNs) are fueling an architectural evolution. Service providers are obliged to give users access to content anytime, anyhow, anywhere, on any device. This requires a converged infrastructure in which users across multiple domains can be served through a single unified domain and all network services...

RFID at Ultra and Super High Frequencies: Theory and application
RFID at Ultra and Super High Frequencies: Theory and application

Contactless identification has now become a mature technology worldwide, and it is only in certain areas of application, such as RFID at UHF and SHF, that some finishing touches are still required. Having worked in this field for many years, I felt the need to draw up a ‘report’ on this area of UHF and SHF. Up to the present, very...

Introduction to Reconfigurable Computing: Architectures, algorithms and applications
Introduction to Reconfigurable Computing: Architectures, algorithms and applications
The book by Christophe Bobda, however, has also been written for people with a software background, substantially reducing the educational leap by bridging the gap. His book has the potential to become a best-seller and to stimulate the urgently needed transformation of the software developer populations mind set, by playing a similar role as known...
Building a BeagleBone Black Super Cluster
Building a BeagleBone Black Super Cluster

Build and configure your own parallel computing Beowulf cluster using BeagleBone Black ARM systems

About This Book

  • Configure your own cluster for high speed parallel computing
  • Benefit from your personally configured super computer which is a power efficient, low-cost, and highly scalable...
Computational Intelligence: Engineering of Hybrid Systems
Computational Intelligence: Engineering of Hybrid Systems

Hybrid Intelligent Systems has become an important research topic in computer science and a key application field in science and engineering. This book offers a gentle introduction to the engineering aspects of hybrid intelligent systems, also emphasizing the interrelation with the main intelligent technologies such as genetic algorithms –...

Creating and Consuming Web Services in Visual Basic
Creating and Consuming Web Services in Visual Basic
One of the more confusing items about Web Services regards defining exactly what and
why they are. Let's begin with why they exist.

Web Services exist to make it easier to integrate applications. Existing technologies include
Java RMI, CORBA, and DCOM. All of these technologies work over networked
environments and allow
...
Distributed Control of Robotic Networks: A Mathematical Approach to Motion Coordination Algorithms (Princeton Series in Applied Mathematics)
Distributed Control of Robotic Networks: A Mathematical Approach to Motion Coordination Algorithms (Princeton Series in Applied Mathematics)
This book covers its subject very thoroughly. The framework the authors have established is very elegant and, if it catches on, this book could be the primary reference for this approach. I don't know of any other book that covers this set of topics.
(Richard M. Murray, California Institute of Technology )

This...

Brain Damage and Repair: From Molecular Research to Clinical Therapy
Brain Damage and Repair: From Molecular Research to Clinical Therapy

This book builds a novel bridge from molecular research to clinical therapy. This approach reveals the functional features of neurons and glia in the particular context of vulnerability and self-protection, intracellular properties and extracellular matrix. Arising from this platform, this volume unfolds the molecular and systemic processes...

Result Page: 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy