Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on ... (Smart Innovation, Systems and Technologies)
Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on ... (Smart Innovation, Systems and Technologies)

Advanced Computing, Networking and Informatics are three distinct and mutually exclusive disciplines of knowledge with no apparent sharing/overlap among them. However, their convergence is observed in many real world applications, including cyber-security, internet banking, healthcare, sensor networks, cognitive radio, pervasive computing...

Ventilatory Support and Oxygen Therapy in Elder, Palliative and End-of-Life Care Patients
Ventilatory Support and Oxygen Therapy in Elder, Palliative and End-of-Life Care Patients

This book provides readers with a comprehensive and up-to-date guide to non-invasive mechanical ventilation in palliative medicine, focusing on why and when it may be necessary. Physicians will find a practical guide to this specific context, particularly focused on pulmonary function and physiology in the elderly, and on ventilatory...

Economics of Grids, Clouds, Systems, and Services: 15th International Conference, GECON 2018, Pisa, Italy, September 18–20, 2018, Proceedings (Lecture Notes in Computer Science (11113))
Economics of Grids, Clouds, Systems, and Services: 15th International Conference, GECON 2018, Pisa, Italy, September 18–20, 2018, Proceedings (Lecture Notes in Computer Science (11113))
This volume constitutes the proceedings of the 15th International Conference on the Economics of Grids, Clouds, Systems, and Services (GECON 2018). GECON is a long-held conference that annually brings together economics and computer science researchers, with the ultimate aim of building a strong...
Catastrophe Modeling: A New Approach to Managing Risk (Huebner International Series on Risk, Insurance and Economic Security)
Catastrophe Modeling: A New Approach to Managing Risk (Huebner International Series on Risk, Insurance and Economic Security)
This book had its genesis in June 1996 when the Wharton Risk
Management and Decision Processes Center (Wharton Risk Center) co-hosted
a conference on “Information Technology and Its Impact on Catastrophic
Risks”. It was one of the events that year celebrating the Anniversary of
the first computer (ENIAC) at the
...
Linux HPC Cluster Installation
Linux HPC Cluster Installation
Few people who use computers have not heard of Linux®. Linux is at the heart of a revolution that is fundamentally changing many aspects of how software is written and delivered. It remains to be seen where this revolution will ultimately lead. Far less nebulous is the Linux penetration into the scientific calculation arena, or more...
Zen and the Art of Information Security
Zen and the Art of Information Security
While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and just plain common sense, readers see through the hype and become comfortable...
Fuzzy Logic and Intelligent Systems (International Series in Intelligent Technologies)
Fuzzy Logic and Intelligent Systems (International Series in Intelligent Technologies)
One of the attractions of fuzzy logic is its utility in solving many real engineering problems. As many have realised, the major obstacles in building a real intelligent machine involve dealing with random disturbances, processing large amounts of imprecise data, interacting with a dynamically changing environment, and coping with uncertainty....
Developments in Language Theory: 12th International Conference, DLT 2008, Kyoto, Japan, September 16-19, 2008, Proceedings
Developments in Language Theory: 12th International Conference, DLT 2008, Kyoto, Japan, September 16-19, 2008, Proceedings
This book constitutes the refereed proceedings of the 12th International Conference on Developments in Language Theory, DLT 2008, held in Kyoto, Japan, September 2008.

The 36 revised full papers presented together with 6 invited papers were carefully reviewed and selected from 102 submissions. All important issues in language theory are...

Machine Translation: Its Scope and Limits
Machine Translation: Its Scope and Limits
Machine Translation (MT) is both an engineering technology and a measure of all things to do with languages and computers—whenever a new theory of language or linguistics is offered, an important criteria for its success is whether or not it will improve machine translation.

This book presents a history of machine translation (MT) from...

Ubiquitous Cardiology: Emerging Wireless Telemedical Applications (Premier Reference Source)
Ubiquitous Cardiology: Emerging Wireless Telemedical Applications (Premier Reference Source)
The Internet and other technological developments are now playing increasing roles in consumer health and the delivery of health services.

Ubiquitous Cardiology: Emerging Wireless Telemedical Applications provides developmental solutions and explanations for cardiovascular diagnostics. Useful to field researchers, academicians,...

Venture Capital and Private Equity Contracting: An International Perspective
Venture Capital and Private Equity Contracting: An International Perspective
Other books present corporate finance approaches to the VC/PE industry, but many key decisions require an understanding of the ways that law and economics work together. This book is better than straight corporate finance textbooks because it offers broad perspectives and principles that enable readers to deduce the economic implications of...
Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace
Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace

Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous "Great...

unlimited object storage image
Result Page: 265 264 263 262 261 260 259 258 257 256 255 254 253 252 251 250 249 248 247 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy