Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
End-to-End Quality of Service Over Heterogeneous Networks
End-to-End Quality of Service Over Heterogeneous Networks
The book presents mechanisms, protocols, and system architectures to achieve end-to-end Quality-of-Service (QoS) over heterogeneous wired/wireless networks in the Internet. Particular focus is on measurement techniques, traffic engineering mechanisms and protocols, signalling protocols as well as transport protocol extensions to support fairness...
Quantum Computing for Everyone (The MIT Press)
Quantum Computing for Everyone (The MIT Press)

An accessible introduction to an exciting new area in computation, explaining such topics as qubits, entanglement, and quantum teleportation for the general reader.

Quantum computing is a beautiful fusion of quantum physics and computer science, incorporating some of the most stunning ideas from twentieth-century...

Quantum Computing without Magic: Devices (Scientific and Engineering Computation)
Quantum Computing without Magic: Devices (Scientific and Engineering Computation)
"Quantum Computing without Magic gives a refreshing and down to earth approach to quantum information as well as quantum devices which will have a fundamental impact on the technology of the 21st century."
Raymond Laflamme, Canada Research Chair in Quantum Information, and Director, Institute for
...
Microscope Image Processing
Microscope Image Processing
Digital image processing is an integral part of microscopy and is increasingly important to the fields of medicine and scientific research. This book provides a unique one-stop reference on the theory, techniques and applications of this technology.

Written by leading experts in the field, the book presents a unique practical perspective
...
Modelling and Reasoning with Vague Concepts
Modelling and Reasoning with Vague Concepts
Vagueness is central to the flexibility and robustness of natural language descriptions. Vague concepts are robust to the imprecision of our perceptions, while still allowing us to convey useful, and sometimes vital, information. The study of vagueness in Artificial Intelligence (AI) is therefore motivated by the desire to incorporate this...
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
An Introduction to 3D Computer Vision Techniques and Algorithms
An Introduction to 3D Computer Vision Techniques and Algorithms

Computer vision encompasses the construction of integrated vision systems and the application of vision to problems of real-world importance. The process of creating 3D models is still rather difficult, requiring mechanical measurement of the camera positions or manual alignment of partial 3D views of a scene. However using algorithms, it is...

The 3-D Global Spatial Data Model: Foundation of the Spatial Data Infrastructure
The 3-D Global Spatial Data Model: Foundation of the Spatial Data Infrastructure
Traditional methods for handling spatial data are encumbered by the assumption of separate origins for horizontal and vertical measurements. Modern measurement systems operate in a 3-D spatial environment. The 3-D Global Spatial Data Model: Foundation of the Spatial Data Infrastructure offers a new model for handling digital...
Risk and Portfolio Analysis: Principles and Methods (Springer Series in Operations Research and Financial Engineering)
Risk and Portfolio Analysis: Principles and Methods (Springer Series in Operations Research and Financial Engineering)

Investment and risk management problems are fundamental problems for  financial institutions and involve both speculative and hedging decisions. A structured approach to these problems naturally leads one to the field of applied mathematics in order to translate subjective probability beliefs and attitudes towards risk and reward into...

EMI Protection for Communication Systems
EMI Protection for Communication Systems

In recent years, the protection of communication services operating in the same of adjacent channels has become more and more challenging. Communication systems need to be protected from natural and man-made interference. This practical reference provides a through understanding of how to protect communication systems from intentional and...

McGraw-Hill Education PTCE Review
McGraw-Hill Education PTCE Review
A rigorous study guide for the PTCE?with strategies, review questions and 4 full-length practice tests

Passing the Pharmacy Technician Certification Exam is essential for all future pharmacy technicians. Give yourself an edge on this test by boosting your exam-day confidence with the best possible study guide. This
...
Implementing Service Quality in IP Networks
Implementing Service Quality in IP Networks

Why implement service quality? Is it possible to ensure reliable service quality in multi-service IP networks? Which technologies help in making end-to-end quality of service a realistic business proposition?

In Implementing Service Quality in IP Networks, Vilho Räisänen answers these questions and more. The author...

unlimited object storage image
Result Page: 37 36 35 34 33 32 31 30 29 28 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy