Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Coping with Interference in Wireless Networks (Signals and Communication Technology)
Coping with Interference in Wireless Networks (Signals and Communication Technology)

Unlike wired networks where transmitters have no effect on receivers other than their own, in wireless networks we are limited by interference. The traditional routing methods are not optimal any more when it comes to a wireless medium. The maximum data rate on each link depends not only on the power in that link but also on the transmitted...

Modern Embedded Computing: Designing Connected, Pervasive, Media-Rich Systems
Modern Embedded Computing: Designing Connected, Pervasive, Media-Rich Systems

Modern embedded systems are used for connected, media-rich, and highly integrated handheld devices such as mobile phones, digital cameras, and MP3 players. All of these embedded systems require networking, graphic user interfaces, and integration with PCs, as opposed to traditional embedded processors that can perform only limited functions...

Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure
Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure
Is “provisioning a web server in 5 minutes for $5” the most interesting thing about the cloud?

Those responsible for IT in their enterprise are quickly discovering that the cloud is a game-changing trend that offers a completely new methodology for service provision. The cloud not only lets you cut
...
HTML5 Game Development Insights
HTML5 Game Development Insights

HTML5 Game Development Insights is a from-the-trenches collection of tips, tricks, hacks, and advice straight from professional HTML5 game developers. The 24 chapters here include unique, cutting edge, and essential techniques for creating and optimizing modern HTML5 games. You will learn things such as using the Gamepad...

Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on ... (Smart Innovation, Systems and Technologies)
Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on ... (Smart Innovation, Systems and Technologies)

Advanced Computing, Networking and Informatics are three distinct and mutually exclusive disciplines of knowledge with no apparent sharing/overlap among them. However, their convergence is observed in many real world applications, including cyber-security, internet banking, healthcare, sensor networks, cognitive radio, pervasive computing...

CCNP Practical Studies: Remote Access (CCNP Self-Study)
CCNP Practical Studies: Remote Access (CCNP Self-Study)

Gain hands-on experience of CCNP Remote Access topics with lab scenarios for the new 642-821 BCRAN exam.

  • Prepare for the CCNP 642-821 BCRAN exam and gain a better, practical understanding of exam concepts

  • Experience how remote access...

Peer-to-Peer : Harnessing the Power of Disruptive Technologies
Peer-to-Peer : Harnessing the Power of Disruptive Technologies

The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and...

Linux HPC Cluster Installation
Linux HPC Cluster Installation
Few people who use computers have not heard of Linux®. Linux is at the heart of a revolution that is fundamentally changing many aspects of how software is written and delivered. It remains to be seen where this revolution will ultimately lead. Far less nebulous is the Linux penetration into the scientific calculation arena, or more...
MySpace Unraveled: What it is and how to use it safely
MySpace Unraveled: What it is and how to use it safely
Do you know what your children are up to on MySpace? MySpace Unraveled: What it is and how to use it safely discusses the booming MySpace social-networking phenomenon and shows you exactly what you need know about MySpace and how to create a safe online experience for your kids. Written by Larry Magid and Anne Collier of Family Tech...
Bluetooth Application Programming with the Java APIs (The Morgan Kaufmann Series in Networking)
Bluetooth Application Programming with the Java APIs (The Morgan Kaufmann Series in Networking)
Bluetooth® wireless technology is a short-range radio standard that provides new opportunities for wireless devices. This radio standard was designed originally as a way of eliminating the cables currently attached to nearly all consumer electronic devices. However, the goals for Bluetooth wireless technology grew as its designers recognized...
Programming INDIGO
Programming INDIGO

Microsoft Code Name “Indigo” is an advanced infrastructure and programming model for creating connected applications. It's like nothing that has come before. That's a bold statement, so allow me to put it in perspective for you.

I wrote my first communication program over 20 years ago and...

Programming Python
Programming Python

If you've mastered Python's fundamentals, you're ready to start using it to get real work done. Programming Python will show you how, with in-depth tutorials on the language's primary application domains: system administration, GUIs, and the Web. You'll also explore how Python is used in databases,...

unlimited object storage image
Result Page: 187 186 185 184 183 182 181 180 179 178 177 176 175 174 173 172 171 170 169 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy