Home | Amazing | Today | Tags | Publishers | Years | Search 
Queueing Networks: A Fundamental Approach (International Series in Operations Research & Management Science)
Queueing Networks: A Fundamental Approach (International Series in Operations Research & Management Science)

The origin of queueing theory and its application traces back to Erlang’s historical work for telephony networks as recently celebrated by the Erlang Centennial, 100 Years of Queueing, Copenhagen, recalling his first paper in 1909. Ever since, the simplicity and fundamental flavour of Erlang’s famous expressions, such as his...

Dictionary of Military Terms: Over 6,000 Words Clearly Defined
Dictionary of Military Terms: Over 6,000 Words Clearly Defined
Over 6,000 entries provide up-to-date coverage of British, American, and international military vocabulary.
 
English is the language most frequently used in international military and peacekeeping operations. This dictionary aims to provide a basic vocabulary of British and American terms relating to the...
RFID-Enabled Sensor Design and Applications (Integrated Microsystems)
RFID-Enabled Sensor Design and Applications (Integrated Microsystems)

Radio frequency identification (RFID) is gaining in popularity, especially as we find ourselves in this communications age and headed towards a ubiquitous computing world. Automatic identification systems become an important aspect not just in today’s technology but also as part of our daily life. We need RFID in our cars,...

Algorithms Unplugged
Algorithms Unplugged

Algorithms specify the way computers process information and how they execute tasks. Many recent technological innovations and achievements rely on algorithmic ideas – they facilitate new applications in science, medicine, production, logistics, traffic, communi¬cation and entertainment. Efficient algorithms not only enable your...

Experience and Knowledge Management in Software Engineering
Experience and Knowledge Management in Software Engineering

Nowadays, there is software everywhere in our life. It controls cars, airplanes, factories, medical implants. Without software, banking, logistics and transportation, media, and even scientific research would not function in the accustomed way. Building and maintaining software is a knowledge-intensive endeavour and requires that specific...

Enterprise Service Computing: From Concept to Deployment
Enterprise Service Computing: From Concept to Deployment

The developed economy is shifting from being manufacturing based to services based. Different from the traditional manufacturing business, the services business is more complicated and dynamic, and end-user driven rather than product driven. To stay competitive, an enterprise thus has to rethink its business strategies and revamp its...

Diagrammatic Reasoning in AI
Diagrammatic Reasoning in AI

This book is really the end product of over a decade of work, on and off, on diagrammatic reasoning in artificial intelligence (AI). In developing this book, I drew inspiration from a variety of sources: two experimental studies, the development of two prototype systems, an extensive literature review and analysis in AI,...

Wirelessness: Radical Empiricism in Network Cultures
Wirelessness: Radical Empiricism in Network Cultures

Motion, to take a good example, is originally a turbid sensation, of which the native shape is perhaps best preserved in the phenomenon of vertigo. (James 1996a, 62)

Between 1999 and 2009, a “ turbid ” or disordered sensation of change was felt as wireless connections expanded and eroded the edges of the Internet...

Web Information Systems and Mining: International Conference, WISM 2011, Taiyuan
Web Information Systems and Mining: International Conference, WISM 2011, Taiyuan
The 2011 International Conference on Web Information Systems and Mining (WISM 2011) was held during September 24–25, 2011 in Taiyuan, China. WISM 2011 received 472 submissions from 20 countries and regions. After rigorous reviews, 112 high-quality papers were selected for publication in the WISM 2011 proceedings. The...
Artificial Intelligence and Computational Intelligence: International Conference, AICI 2010, Sanya, China
Artificial Intelligence and Computational Intelligence: International Conference, AICI 2010, Sanya, China
The 2010 International Conference on Artificial Intelligence and Computational Intelligence (AICI 2010) was held October 23–24, 2010 in Sanya, China. The AICI 2010 received 1,216 submissions from 20 countries and regions. After rigorous reviews, 105 high-quality papers were selected for publication in the AICI 2010...
Web Information Systems and Mining: International Conference, WISM 2011, Taiyuan, China
Web Information Systems and Mining: International Conference, WISM 2011, Taiyuan, China

The 2011 International Conference on Web Information Systems and Mining

(WISM 2011) was held during September 24–25, 2011 in Taiyuan, China. WISM 2011 received 472 submissions from 20 countries and regions. After rigorous reviews, 112 high-quality papers were selected for publication in the WISM...
Hadoop in Practice
Hadoop in Practice

Summary

Hadoop in Practice collects 85 Hadoop examples and presents them in a problem/solution format. Each technique addresses a specific task you'll face, like querying big data using Pig or writing a log file loader. You'll explore each problem step by step, learning both how to build and deploy...

Result Page: 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy