Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Quantum Gravitation: The Feynman Path Integral Approach
Quantum Gravitation: The Feynman Path Integral Approach
The book covers the theory of Quantum Gravitation from the point of view of Feynman path integrals. These provide a manifestly covariant approach in which fundamental quantum aspects of the theory such as radiative corrections and the renormalization group can be systematically and consistently addressed. The path integral method is suitable for...
Business Intelligence: Data Mining and Optimization for Decision Making
Business Intelligence: Data Mining and Optimization for Decision Making

Business intelligence is a broad category of applications and technologies for gathering, providing access to, and analyzing data for the purpose of helping enterprise users make better business decisions. The term implies having a comprehensive knowledge of all factors that affect a business, such as customers, competitors, business partners,...

Wireless Broadband Handbook
Wireless Broadband Handbook
Translate broadband wireless mumbo-jumbo into clear business terms

No guide tackles and clarifies the chaotic acronym-ridden world of broadband wireless better than Wireless Broadband Handbook. Best-selling telecom author Regis "Bud" Bates has the formula to give you the "instant expertise" you need to compete and...

SIP Trunking
SIP Trunking

The first complete guide to planning, evaluating, and implementing high-value SIP trunking solutions

 

Most large enterprises have switched to IP telephony, and service provider backbone networks have largely converted to VoIP transport. But there’s a...

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

With the increasing focus on IT Security comes a higher demand for identity management in the modern business. This requires a flexible, scalable, and secure authentication method. Identity control is made mandatory by many public standards, such as PCI, and PKI is an essential component to set up authentication in many technologies,...

An Extended Entity-Relationship Model: Fundamentals and Pragmatics (Lecture Notes in Computer Science)
An Extended Entity-Relationship Model: Fundamentals and Pragmatics (Lecture Notes in Computer Science)
Studying modern database languages one recognizes that there is a gap between language features and theoretical foundations:

* Studies of the formal foundations exist for the relational data model but not for the Entity-Relationship model, which is a model used by numerous practical people. Also, most extensions of
...
Business Model Generation: A Handbook for Visionaries, Game Changers, and Challengers
Business Model Generation: A Handbook for Visionaries, Game Changers, and Challengers

Business Model Generation is a handbook for visionaries, game changers, and challengers striving to defy outmoded business models and design tomorrow's enterprises. If your organization needs to adapt to harsh new realities, but you don't yet have a strategy that will get you out in front of your competitors, you need...

Restricted Kalman Filtering: Theory, Methods, and Application (SpringerBriefs in Statistics)
Restricted Kalman Filtering: Theory, Methods, and Application (SpringerBriefs in Statistics)

In this book, I highlight the developments in Kalman filtering subject to general linear constraints. Essentially, the material to be presented is almost entirely based on the results and examples originally developed in Pizzinga et al. (2008a), Cerqueira et al. (2009), Pizzinga (2009, 2010), Souza et al. (2011), Pizzinga et al. (2011), and...

Quantitative Marketing and Marketing Management: Marketing Models and Methods in Theory and Practice
Quantitative Marketing and Marketing Management: Marketing Models and Methods in Theory and Practice

Quantitative marketing has been gaining importance during the last decade. This is indicated by the growing number of model- and method-oriented studies published in leading journals as well as by the many successful applications of quantitative approaches in pricing, advertising, new product planning, and market segmentation decisions. In...

Tensor Product Model Transformation in Polytopic Model-Based Control (Automation and Control Engineering)
Tensor Product Model Transformation in Polytopic Model-Based Control (Automation and Control Engineering)

Tensor Product Model Transformation in Polytopic Model-Based Control offers a new perspective of control system design. Instead of relying solely on the formulation of more effective LMIs, which is the widely adopted approach in existing LMI-related studies, this cutting-edge book calls for a systematic modification and...

Seven Concurrency Models in Seven Weeks: When Threads Unravel (The Pragmatic Programmers)
Seven Concurrency Models in Seven Weeks: When Threads Unravel (The Pragmatic Programmers)

Your software needs to leverage multiple cores, handle thousands of users and terabytes of data, and continue working in the face of both hardware and software failure. Concurrency and parallelism are the keys, and Seven Concurrency Models in Seven Weeks equips you for this new world. See how emerging technologies such as actors and...

Design Computing and Cognition '10
Design Computing and Cognition '10

This volume contains the refereed and revised papers of the Fourth International Conference on Design Computing and Cognition (DCC'10), held in Stuttgart, Germany. The material in this book represents the state-of-the-art research and developments in design computing and design cognition.

The papers are grouped under the...

unlimited object storage image
Result Page: 272 271 270 269 268 267 266 265 264 263 262 261 260 259 258 257 256 255 254 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy