Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Networks ISE: A Systems Approach
Computer Networks ISE: A Systems Approach

I what has happened in that time. We have seen the transformation of the Web from a small experiment to a World Wide phenomenon. We have seen the emergenceof voice over IP and peer-to-peer content sharing. We have seen technology speed up a hundred-fold, the emergence of broadband to the home, and the rise of botnets and other horrid security...

Apoptosis, Senescence and Cancer (Cancer Drug Discovery and Development)
Apoptosis, Senescence and Cancer (Cancer Drug Discovery and Development)
The goals of chemotherapy (and radiotherapy) are to eliminate tumor cell targets by promoting cell death. In recent years, a major focus has been placed on programmed cell death or apoptosis as the primary mechanism of cell killing. However, tumor cells may respond to various forms of treatment in diverse ways, only some of which...
Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web
Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web

Privacy is a basic human need, and losing privacy is perceived as an extremely threatening experience. Privacy embraces solitude, personal space, or intimacy with family and friends and as such, it is a ubiquitous and trans-cultural phenomenon. Privacy leverages well-being; without privacy we are at risk of becoming physically or...

Efficient Graph Rewriting and Its Implementation (Lecture Notes in Computer Science)
Efficient Graph Rewriting and Its Implementation (Lecture Notes in Computer Science)

Graph rewriting systems have come of age. In autumn 1994, the 25th anniversary of the first publication in this area was celebrated at the 5th Workshop on Graph Grammars and their Applications to Computer Science. In the interim, the subject has evolved. The current situation can be described by a three-stage model. At the very low...

Mechanisms in Advanced Organic Chemistry
Mechanisms in Advanced Organic Chemistry

For a very long time the need was felt by graduate and postgraduate students of Chemistry of almost all colleges and of Indian Universities for a book dealing with advanced mechanistic organic chemistry written in understandable language and with suitable examples which can be easily grasped to make their concept clear. Besides students, this...

Robust Motion Detection in Real-Life Scenarios (SpringerBriefs in Computer Science)
Robust Motion Detection in Real-Life Scenarios (SpringerBriefs in Computer Science)

This work proposes a complete sensor-independent visual system that provides robust target motion detection. First, the way sensors obtain images, in terms of resolution distribution and pixel neighbourhood, is studied. This allows a spatial analysis of motion to be carried out. Then, a novel background maintenance approach for robust target...

Organic Chemistry
Organic Chemistry
This new and innovative text helps students develop a deeper understanding of organic chemistry. It treats the subject as a coherent whole, complete with numerous logical connections, consequences, and an underlying structure and "language." Employing an approach based on mechanism and reaction type, the book empasizes understanding ideas...
Robotics (Intelligent Systems, Control and Automation: Science and Engineering)
Robotics (Intelligent Systems, Control and Automation: Science and Engineering)

This supplementary introductory tutorial treats the following subjects: the basic characteristics of industrial robot mechanisms; the pose and movement of an object, which are described by homogenous transformation matrices; a geometric model of robot mechanism; a short introduction into kinematics and dynamics of robots; robot sensors and the...

Secure Roaming in 802.11 Networks (Communications Engineering)
Secure Roaming in 802.11 Networks (Communications Engineering)
WLAN users want to remain connected to the network as they move from place to place in an office building, airport, library, etc. But the original 802.11 standard was not designed to support roaming. However, enhancements to the 802.11 now make it possible to add reliable, secure roaming capabilities to any 802.11-based WLAN. This thorough guide...
Engineering Noise Control: Theory and Practice
Engineering Noise Control: Theory and Practice

The third edition of Engineering Noise Control has been thoroughly revised, updated and extended. Each chapter contains new material, much of which is not available elsewhere. The result is a comprehensive discussion of the theoretical principles and concepts of acoustics and noise control, a detailed discussion of the hearing...

Cell Therapy, Stem Cells and Brain Repair (Contemporary Neuroscience)
Cell Therapy, Stem Cells and Brain Repair (Contemporary Neuroscience)
As our world continues to evolve, the field of regenerative medicine follows suit. Although many modern day therapies focus on synthetic and natural medicinal treatments for brain repair, many of these treatments and prescriptions lack adequate results or only have the ability to slow the progression of neurological disease or...
Understanding PKI: Concepts, Standards, and Deployment Considerations, Second Edition
Understanding PKI: Concepts, Standards, and Deployment Considerations, Second Edition
PKI (public-key infrastructure) enables the secure exchange of data over otherwise unsecured media, such as the Internet. PKI is the underlying cryptographic security mechanism for digital certificates and certificate directories, which are used to authenticate a message sender. Because PKI is the standard for authenticating commercial electronic...
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy