Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Synchronization in Wireless Sensor Networks: Parameter Estimation, Peformance Benchmarks, and Protocols
Synchronization in Wireless Sensor Networks: Parameter Estimation, Peformance Benchmarks, and Protocols

The clock or time synchronization problem in wireless sensor networks (WSNs) requires a procedure for providing a common notion of time across the nodes of WSNs. In general, clock synchronization is viewed as a critical factor in maintaining the good functioning of WSNs due mainly to their decentralized organization and timing uncertainties...

Making Android Accessories with IOIO
Making Android Accessories with IOIO
Android phones are a great platform for developing apps, but sometimes it is nice if those apps go beyond the built-in hardware of the phone and connect to some homemade electronics.

The IOIO board allows you to do just that, and this book will show you how to use the IOIO board and interface it to various different
...
IBM InfoSphere Replication Server and Data Event Publisher
IBM InfoSphere Replication Server and Data Event Publisher

Business planning is no longer just about defining goals, analyzing critical issues, and then creating strategies. You must aid business integration by linking changed-data events in DB2 databases on Linux, UNIX, and Windows with EAI solutions , message brokers, data transformation tools, and more. Investing in this book will save you many...

Java Security Solutions
Java Security Solutions
Your complete guide to the what, why, where, and how of Java Security

In this unique guide, two Java security experts show you how to take full advantage of Java security technologies–cryptography, algorithms, and architecture. They explain today’s Java security tools, concepts, protocols, and specifications, including ECC, RSA,...

Encyclopedia of Cryptology
Encyclopedia of Cryptology

Secret writing for the transmission of messages has been practiced for nearly 4,000 years. According to David Kahn, the great historian of cryptology, the first example of an intentionally altered message can be traced to a tomb in ancient Egypt dated about 1900 b.c. In the 40 centuries since that...

Death, Judgment, Heaven, and Hell: Sayings of the Fathers of the Church
Death, Judgment, Heaven, and Hell: Sayings of the Fathers of the Church
Catholic University of America Press is proud to present the second volume in its new Sayings of the Fathers of the Church Series. Featuring a wide range of scholars compiling material from our acclaimed Fathers of the Church volumes, each title will be devoted to a few specific areas of theology. The inaugural volume covered The...
Introduction to Cryptography with Java Applets
Introduction to Cryptography with Java Applets
Cryptography is the art of secret writing. It involves transforming information into apparently unintelligible garbage so that unwanted eyes will be unable to comprehend it. This transformation, however, must be done so that it is reversible, so that individuals intended to view the information may do so. This is the traditional use of...
How Cool Stuff Works
How Cool Stuff Works

Communication systems have existed for thousands of years. A postal system, with relays of riders to deliver messages, was used in Ancient Persia (now Iran) as long ago as the 6th century BC. Until the 1800s, sending post in this way was the only method of long-distance communication. The time it took for a message to be received depended on...

Pro MSMQ: Microsoft Message Queue Programming
Pro MSMQ: Microsoft Message Queue Programming

This will be the only book on the market with in-depth coverage of using Message Queuing from .NET code – it won't just be the number one in its category; it will be the only book in its category.

* The only book targeted at developers with in-depth coverage of MSMQ 3.0 and MSMQ triggers

* The only MSMQ book...

Learning Storm
Learning Storm

Create real-time stream processing applications with Apache Storm

About This Book

  • Integrate Storm with other Big Data technologies like Hadoop, HBase, and Apache Kafka
  • Explore log processing and machine learning using Storm
  • Step-by-step and easy-to-understand guide to...
ASP.net Web Developer's Guide (With CD-ROM)
ASP.net Web Developer's Guide (With CD-ROM)
Aimed at the working ASP developer who wants to move to Microsoft .NET, ASP.NET Unleashed: Web Developers Guide offers an excellent example-based programming tutorial. With its strong practical focus, this title offers an excellent choice for learning ASP.NET quickly.

Most every computer book uses examples illustrating programming...

Jabber Developer's Handbook (Developer's Library)
Jabber Developer's Handbook (Developer's Library)
IN LOOKING AT HOW WE COULD BEST SERVE our readers, we had to decide whether to ask you to spend your time wading through the detail of what particular messages look like (and there are many of them) or to focus more on interesting applications. Because the details of message formats are well-documented elsewhere (see Appendixes A and C for...
unlimited object storage image
Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy