Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...
Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...

Multiplexed networks are essential for the unified, efficient and cost-effective exchange of electronic information within embedded component systems. This is especially important in automotive manufacturing as vehicles become increasingly reliant on robust electronic networks and systems for improved reliability, anti-lock brake systems (ABS),...

Crypto Anarchy, Cyberstates, and Pirate Utopias
Crypto Anarchy, Cyberstates, and Pirate Utopias

In Crypto Anarchy, Cyberstates, and Pirate Utopias, Peter Ludlow extends the approach he used so successfully in High Noon on the Electronic Frontier, offering a collection of writings that reflects the eclectic nature of the online world, as well as its tremendous energy and creativity. This time the subject is the emergence...

Information Theory and Reliable Communication
Information Theory and Reliable Communication
This book is designed primarily for use as a first-year graduate text in information theory, suitable for both engineers and mathematicians. It is assumed that the reader has some understanding of freshman calculus and elementary probability, and in the later chapters some introductory random process theory. Unfortunately there is one more...
Data Modeling Fundamentals: A Practical Guide for IT Professionals
Data Modeling Fundamentals: A Practical Guide for IT Professionals
The purpose of this book is to provide a practical approach for IT professionals to acquire the necessary knowledge and expertise in data modeling to function effectively. It begins with an overview of basic data modeling concepts, introduces the methods and techniques, provides a comprehensive case study to present the details of the data model...
Introduction to ATM/IP Design and Performance with Applications Analysis Software
Introduction to ATM/IP Design and Performance with Applications Analysis Software
Many engineers and students experience difficulty in making sense of issues associated with IP and ATM teletraffic techniques. This is partly because of the subject itself: networks are flexible, complicated, and still evolving. However, some of the difficulties arise because of the advanced mathematical methods that have been applied to provide...
Microformats: Empowering Your Markup for Web 2.0
Microformats: Empowering Your Markup for Web 2.0
Microformats burst onto the scene a couple of years ago and are fast becoming an essential tool for all professional web designers and developers. Imagine being able to integrate all of your web-based contact details, tagged articles, and geographical information seamlessly in web and desktop applications, without having to add anything extra to...
Mail and Internet Surveys: The Tailored Design Method  2007 Update with New Internet, Visual, and Mixed-Mode Guide
Mail and Internet Surveys: The Tailored Design Method 2007 Update with New Internet, Visual, and Mixed-Mode Guide
A crucial resource for increasing response rates and obtaining high-quality feedback from mail, electronic, and other surveys

Don Dillman's Mail and Internet Surveys, Second Edition has been the definitive guide for creating and conducting successful surveys using both traditional and new media channels. Now, this...

John Locke's Politics of Moral Consensus
John Locke's Politics of Moral Consensus
‘… The book is written in a very accessible and often … punchy way … In its overall thesis that liberalism requires a moral/religious underpinning, the book is very interesting and stimulating.’ Roger Woolhouse, University of York

'… engaging and thought-provoking … To the scholar of Locke,
...
Mobile Messaging Technologies and Services: SMS, EMS and MMS
Mobile Messaging Technologies and Services: SMS, EMS and MMS
Mobile messaging is practically the first data communication service in the wireless domain. It is a major advance on the conventional practice of providing only voice communication service over the wireless interface. Thus, mobile messaging is the initial step to bring the Internet to wireless terminals and has considerable importance both for...
Design Patterns (Wordware Applications Library)
Design Patterns (Wordware Applications Library)
Design patterns books have been gaining popularity since languages like Java and C++ first became widely used. Since Microsoft released its first truly object-oriented language, .NET, software designers from an even broader range of business and programming spheres have been looking for ways to refine and write better code. Many have turned toward...
Malicious Cryptography: Exposing Cryptovirology
Malicious Cryptography: Exposing Cryptovirology
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first...
Software Defined Radio: The Software Communications Architecture (Wiley Series in Software Radio)
Software Defined Radio: The Software Communications Architecture (Wiley Series in Software Radio)

The Software Communications Architecture (SCA) establishes an implementation-independent framework for the development of Joint Tactical Radio System software configurable radios. It specifies the Operating Environment, services and interfaces that applications use.

Software Defined Radio: The Software...

unlimited object storage image
Result Page: 384 383 382 381 380 379 378 377 376 375 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy