Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Technologies for the Wireless Future: Wireless World Research Forum (WWRF)
Technologies for the Wireless Future: Wireless World Research Forum (WWRF)
As 3G mobile communication systems are being deployed, the research community is now focusing on the research needed for the long-term evolution of 3G and 4G systems. This fully updated second volume of the successful Technologies for the Wireless Future is a unique and timely book, presenting up-to-the-minute ideas and trends in mobile...
Java Message Service
Java Message Service
The Java Message Service (JMS) provides a way for the components of a distributed application to talk asynchronously, or for welding together legacy enterprise systems. Think of it as application-to-application e-mail. Unlike COM, JMS uses one or more JMS servers to handle the messages on a store-and-forward basis, so that the loss of one or more...
Error Correction Coding: Mathematical Methods and Algorithms
Error Correction Coding: Mathematical Methods and Algorithms
An unparalleled learning tool and guide to error correction coding

Error correction coding techniques allow the detection and correction of errors occurring during the transmission of data in digital communication systems. These techniques are nearly universally employed in modern communication systems, and are thus an important component of...

Multiagent Systems: A Modern Approach to Distributed Artificial Intelligence
Multiagent Systems: A Modern Approach to Distributed Artificial Intelligence
The study of multiagent systems began in the field of distributed artificial intelligence (DAI) about 20 years
ago. Today these systems are not simply a research topic, but are also beginning to become an important subject of
academic teaching and industrial and commercial application. While there are several high-quality collections of
...
Cryptography in C and C++, Second Edition
Cryptography in C and C++, Second Edition

This book covers all that is needed to write professional-level cryptographic code. An expanded and improved version of the very well received first edition, it includes approximately 100 pages of new material as well as numerous improvements in the original text.

Text focusing on the practical aspects of cryptography in C and C++,
...
Digital Rights Management: Technological, Economic, Legal and Political Aspects
Digital Rights Management: Technological, Economic, Legal and Political Aspects
The content industries consider Digital Rights Management (DRM) to contend with unauthorized downloading of copyrighted material, a practice that costs artists and distributors massively in lost revenue.

Based on two conferences that brought together high-profile specialists in this area - scientists, lawyers, academics, and business...

Software Testing: Testing Across the Entire Software Development Life Cycle
Software Testing: Testing Across the Entire Software Development Life Cycle
Software Testing presents one of the first comprehensive guides to testing activities, ranging from test planning through test completion for every phase of software under development, and software under revision. Real life case studies are provided to enhance understanding as well as a companion website with tools and examples....
Harnessing Hibernate
Harnessing Hibernate
Harnessing Hibernate is an ideal introduction to the popular framework that lets Java developers work with information from a relational database easily and efficiently. Databases are a very different world than Java objects, and they often involve people with different skills and specializations. With Hibernate, bridging these two worlds is...
Video Color Correction for Non-Linear Editors: A Step-by-Step Guide
Video Color Correction for Non-Linear Editors: A Step-by-Step Guide
Today's non-linear editing systems are equipped with a wide range of color correction tools that were previously only available in dedicated color correction suites. This book shows video editors how to take full advantage of their power. Clear, step-by-step instructions are included for Avid XPress DV, Avid Symphony, Final Cut Pro, Adobe Premiere,...
Content Networking in the Mobile Internet
Content Networking in the Mobile Internet

A cutting-edge guide to the next generation Mobile Internet architecture and applications

The last several years have witnessed dramatic changes in the wireless Web interface environment, specifically in the way that content is stored, distributed, and checked for consistency while leveraging location awareness. This phenomenon is...

Feature Extraction & Image Processing, Second Edition
Feature Extraction & Image Processing, Second Edition
We will no doubt be asked many times: why on earth write a new book on computer vision? Fair question: there are already many good books on computer vision in the bookshops, as you will find referenced later, so why add to them? Part of the answer is that any textbook is a snapshot of material that exists before it. Computer vision, the art of...
Quantum Invariants: A Study of Knot, 3-Manifolds, and Their Sets
Quantum Invariants: A Study of Knot, 3-Manifolds, and Their Sets
Ohtsuk's book is very readable, for he makes an attempt to present the material as straightforward as possible. -- Mathematical Reviews, 2003

This is a nicely written and useful book....presenting a lot of material ordered by a clear guiding line. -- Mathematics Abstracts, 2002

This book provides
...
unlimited object storage image
Result Page: 263 262 261 260 259 258 257 256 255 254 253 252 251 250 249 248 247 246 245 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy