Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Foundations of Embedded Systems (Studies in Systems, Decision and Control (195))
Foundations of Embedded Systems (Studies in Systems, Decision and Control (195))
This book is devoted to embedded systems (ESs), which can now be found in practically all fields of human activity. Embedded systems are essentially a special class of computing systems designed for monitoring and controlling objects of the physical world.

The book begins by discussing the distinctive features of
...
C# Class Design Handbook: Coding Effective Classes
C# Class Design Handbook: Coding Effective Classes

The mission of the C# Class Design Handbook is to provide you with a critical understanding of designing classes, making you better equipped to take full advantage of C#’s power to create robust, flexible, reusable classes. This comprehensive guide lifts the lid on syntax and examines what’s really going on behind the...

Too Soon To Tell: Essays for the End of The Computer Revolution (Perspectives)
Too Soon To Tell: Essays for the End of The Computer Revolution (Perspectives)
Based on author David A. Grier's column "In Our Time," which runs monthly in Computer magazine, Too Soon To Tell presents a collection of essays skillfully written about the computer age, an era that began February 1946. Examining ideas that are both contemporary and timeless, these chronological essays examine the revolutionary nature of...
Getting Started with CouchDB
Getting Started with CouchDB
When I was about nine years old, I had an Acorn Electron, a home computer developed by Acorn Machines and one of the major precursors to modern home computing. It was tiny by today’s standards, having just 32K of RAM, a 2MHz CPU, and with the staggering ability to store a massive 360 Kb on the 3 inch Amstrad disks I was using...
High Performance Control of AC Drives with Matlab / Simulink Models
High Performance Control of AC Drives with Matlab / Simulink Models

A comprehensive guide to understanding AC machines with exhaustive simulation models to practice design and control

Nearly seventy percent of the electricity generated worldwide is used by electrical motors. Worldwide, huge research efforts are being made to develop commercially viable three- and multi-phase motor drive...

Windows Server 2012 Hyper-V Installation and Configuration Guide
Windows Server 2012 Hyper-V Installation and Configuration Guide

Go-to guide for using Microsoft's updated Hyper-V as a virtualization solution

Windows Server 2012 Hyper-V offers greater scalability, new components, and more options than ever before for large enterprise systems and small/medium businesses. Windows Server 2012 Hyper-V Installation and Configuration Guide is...

Fuzzy Relational Calculus: Theory, Applications And Software (Advances in Fuzzy Systems)
Fuzzy Relational Calculus: Theory, Applications And Software (Advances in Fuzzy Systems)

This book examines fuzzy relational calculus theory with applications in various engineering subjects. The scope of the text covers unified and exact methods with algorithms for direct and inverse problem resolution in fuzzy relational calculus. Extensive engineering applications of fuzzy relation compositions and fuzzy linear systems...

Registration and Recognition in Images and Videos (Studies in Computational Intelligence)
Registration and Recognition in Images and Videos (Studies in Computational Intelligence)

Computer vision is the science and technology of making machines that see. It is concerned with the theory, design and implementation of algorithms that can automatically process visual data to recognize objects, track and recover their shape and spatial layout.

The International Computer Vision Summer School - ICVSS was...

Linux Security Cookbook
Linux Security Cookbook
f you run a Linux machine, you must think about security. Consider this story told by Scott, a system administrator we know:

In early 2001, I was asked to build two Linux servers for a client. They just wanted the machines installed and put online. I asked my boss if I should secure them, and he said no, the...

How to Cheat at Securing Linux
How to Cheat at Securing Linux
Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system for the majority of their servers designed for medium to large size businesses. As with any technologies, increased...
Food Packaging Technology (Sheffield Packaging Technology)
Food Packaging Technology (Sheffield Packaging Technology)
This is a very useful book addressing a wide range of scientists (professors, researchers, technologists and manufacturers of packaging machinery) involved in the field of packaging. … This book will prove a necessary and potent companion … for [those] in the field … .
- Journal of the Science of Food and Agriculture,
...
A Guide to Experimental Algorithmics
A Guide to Experimental Algorithmics

Computational experiments on algorithms can supplement theoretical analysis by showing what algorithms, implementations, and speed-up methods work best for specific machines or problems. This book guides the reader through the nuts and bolts of the major experimental questions: What should I measure? What inputs should I test? How do I...

unlimited object storage image
Result Page: 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy