Home | Amazing | Today | Tags | Publishers | Years | Search 
Computing Networks: From Cluster to Cloud Computing (ISTE)
Computing Networks: From Cluster to Cloud Computing (ISTE)

“Computing Networks” explores the core of the new distributed computing infrastructures we are using today:  the networking systems of clusters, grids and clouds. It helps network designers and distributed-application developers and users to better understand the technologies, specificities, constraints and benefits of these...

Memory Allocation Problems in Embedded Systems: Optimization Methods (ISTE)
Memory Allocation Problems in Embedded Systems: Optimization Methods (ISTE)

Embedded systems are everywhere in contemporary life and are supposed to make our lives more comfortable. In industry, embedded systems are used to manage and control complex systems (e.g. nuclear power plants, telecommunications and flight control) and they are also taking an important place in our daily activities (e.g. smartphones,...

Multi-criteria Decision Analysis: Methods and Software
Multi-criteria Decision Analysis: Methods and Software
People face making decisions both in their professional and private lives. A manager in a company, for example, may need to evaluate suppliers and develop partnerships with the best ones. A household may need to choose an energy supplier for their family home. Students cannot ignore university rankings. Often candidates for a job...
Techniques for Noise Robustness in Automatic Speech Recognition
Techniques for Noise Robustness in Automatic Speech Recognition

Automatic speech recognition (ASR) systems are finding increasing use in everyday life. Many of the commonplace environments where the systems are used are noisy, for example users calling up a voice search system from a busy cafeteria or a street. This can result in degraded speech recordings and adversely affect the performance of speech...

Publish / Subscribe Systems: Design and Principles (Wiley Series on Communications Networking & Distributed Systems)
Publish / Subscribe Systems: Design and Principles (Wiley Series on Communications Networking & Distributed Systems)

This book offers an unified treatment of the problems solved by publish/subscribe, how to design and implement the solutions

In this book, the author provides an insight into the publish/subscribe technology including the design, implementation, and evaluation of new systems based on the technology.  The book also...

Filtering, Control and Fault Detection with Randomly Occurring Incomplete Information
Filtering, Control and Fault Detection with Randomly Occurring Incomplete Information

In the context of systems and control, incomplete information refers to a dynamical system in which knowledge about the system states is limited due to the difficulties in modelling complexity in a quantitative way. The well-known types of incomplete information include parameter uncertainties and norm-bounded nonlinearities. Recently, in...

Practical Database Programming with Visual Basic.NET
Practical Database Programming with Visual Basic.NET

The most up-to-date Visual Basic.NET programming textbook—covering both fundamentals and advanced-level programming techniques—complete with examples and solutions

Visual Basic.NET (VB.NET) is an object-oriented computer programming language that can be viewed as an evolution of the classic Visual Basic (VB),...

Product and Systems Development: A Value Approach
Product and Systems Development: A Value Approach

A thorough treatment of product and systems development in terms of value to all stakeholders

Product and Systems Development compiles more than twenty years of research and practice from a value perspective, from vision and marketing to design, manufacturing, delivery, operations, and maintenance. It defines...

Public Key Cryptography: Applications and Attacks (IEEE Press Series on Information and Communication Networks Security)
Public Key Cryptography: Applications and Attacks (IEEE Press Series on Information and Communication Networks Security)

This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many...

Introduction to Wireless Localization: With iPhone SDK Examples
Introduction to Wireless Localization: With iPhone SDK Examples

This book provides a comprehensive overview of the entire landscape of both outdoor and indoor wireless positioning, and guides the reader step by step in the implementation of wireless positioning applications on the iPhone. Explanations of fundamental positioning techniques are given throughout the text, along with many programming...

Data Structures and Algorithms in Python
Data Structures and Algorithms in Python

Based on the authors’ market leading data structures books in Java and C++, this book offers a comprehensive, definitive introduction to data structures in Python by authoritative authors. Data Structures and Algorithms in Python is the first authoritative object-oriented book available for Python data structures....

The Interior Design Business Handbook: A Complete Guide to Profitability
The Interior Design Business Handbook: A Complete Guide to Profitability

Thousands of interior design professionals have come to rely on The Interior Design Business Handbook for comprehensive, accessible coverage of the essential procedures, tools, and techniques necessary to manage a successful interior design business. The Fifth Edition of this essential resource has been revised to address the...

Result Page: 350 349 348 347 346 345 344 343 342 341 340 339 338 337 336 335 334 333 332 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy