Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Space Division Multiple Access for Wireless Local Area Networks (Engineering and Computer Science)
Space Division Multiple Access for Wireless Local Area Networks (Engineering and Computer Science)
The tendency towards more mobility and flexibility favors wireless networks for future broadband services, especially in local area and residential networks. Two major challenges in developing such high data-rate wireless networks are the channel distortion caused by multipath propagation and the limitations on bandwidth usage. In this book,...
Visualization in Medicine: Theory, Algorithms, and Applications (The Morgan Kaufmann Series in Computer Graphics)
Visualization in Medicine: Theory, Algorithms, and Applications (The Morgan Kaufmann Series in Computer Graphics)
Visualization in Medicine is the first book on visualization and its application to problems in medical diagnosis, education, and treatment. The book describes the algorithms, the applications and their validation (how reliable are the results?), and the clinical evaluation of the applications (are the techniques useful?). It...
MCSE Windows 2000 Active Directory Services Infrastructure Exam Cram 2 (Exam 70-217)
MCSE Windows 2000 Active Directory Services Infrastructure Exam Cram 2 (Exam 70-217)
MCSE Windows 2000 Active Directory Services Infrastructure Exam Cram 2 (Exam 70-217) is the perfect study guide to help you pass one of the four core exams in Microsoft's Windows 2000 certification program. This certification exam measures the ability to install, configure, and troubleshoot the Windows 2000 Active Directory components, DNS for...
The Mac Hacker's Handbook
The Mac Hacker's Handbook
As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat...
Web 2.0 Architectures: What entrepreneurs and information architects need to know
Web 2.0 Architectures: What entrepreneurs and information architects need to know

Web 2.0 is more pervasive than ever, with business analysts and technologists struggling to comprehend the opportunity it represents. But what exactly is Web 2.0 -- a marketing term or technical reality? This fascinating book finally puts substance behind the phenomenon by identifying the core patterns of Web 2.0, and by introducing an...

The Art of Film Acting: A  Guide For Actors and Directors
The Art of Film Acting: A Guide For Actors and Directors
This guide for actors and directors develops a valid method for training performers to act from their core--whether they are cold reading, auditioning, or performing for film or television. This book teaches actors how to achieve and respond to believable and honest emotions before the camera, and it maintains that the key to a successful...
Linguistic Modeling of Information and Markup Languages: Contributions to Language Technology
Linguistic Modeling of Information and Markup Languages: Contributions to Language Technology

This book addresses the interests of a large community of researchers in the fields of XML-based annotation techniques and corpus-based language technology. It covers the most significant recent developments in this field, from multi-layered mark-up and standards to theoretical formalisms to applications. The contributions are based on research...

Coping with Interference in Wireless Networks (Signals and Communication Technology)
Coping with Interference in Wireless Networks (Signals and Communication Technology)

Unlike wired networks where transmitters have no effect on receivers other than their own, in wireless networks we are limited by interference. The traditional routing methods are not optimal any more when it comes to a wireless medium. The maximum data rate on each link depends not only on the power in that link but also on the transmitted...

Operating Systems In Depth: Design and Programming
Operating Systems In Depth: Design and Programming

The goal of this book is to bring together and explain current practice in operating systems. This includes much of what is traditionally covered in operating-system textbooks: concurrency, scheduling, linking and loading, storage management (both real and virtual), fi le systems, and security. However, I also cover issues that come up...

Modern Embedded Computing: Designing Connected, Pervasive, Media-Rich Systems
Modern Embedded Computing: Designing Connected, Pervasive, Media-Rich Systems

Modern embedded systems are used for connected, media-rich, and highly integrated handheld devices such as mobile phones, digital cameras, and MP3 players. All of these embedded systems require networking, graphic user interfaces, and integration with PCs, as opposed to traditional embedded processors that can perform only limited functions...

Practical Salesforce.com Development Without Code: Customizing Salesforce on the Force.com Platform
Practical Salesforce.com Development Without Code: Customizing Salesforce on the Force.com Platform

Are you facing a challenging Salesforce.com problem--say, relating to automation, configuration, formulation, or reporting--that you can't quite crack? Or maybe you are hoping to infuse some creativity into your solution design strategy to solve problems faster or make solutions more efficient? Practical Salesforce.com Development...

Hibernate: A J2EE™ Developer's Guide
Hibernate: A J2EE™ Developer's Guide
Build fast, high-performance Java database applications with Hibernate.

Hibernate makes it far easier to build robust, high-performance database applications with Java. Now there's a practical, hands-on guide to using Hibernate's flexible, fast object/relational persistence and query services. Will Iverson covers every facet of...

unlimited object storage image
Result Page: 343 342 341 340 339 338 337 336 335 334 333 332 331 330 329 328 327 326 325 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy