Home | Amazing | Today | Tags | Publishers | Years | Search 
Mobility, Data Mining and Privacy: Geographic Knowledge Discovery
Mobility, Data Mining and Privacy: Geographic Knowledge Discovery
The technologies of mobile communications and ubiquitous computing pervade our society, and wireless networks sense the movement of people and vehicles, generating large volumes of mobility data. This is a scenario of great opportunities and risks: on one side, mining this data can produce useful knowledge, supporting sustainable mobility and...
The Compiler Design Handbook: Optimizations and Machine Code Generation, Second Edition
The Compiler Design Handbook: Optimizations and Machine Code Generation, Second Edition
Todays embedded devices and sensor networks are becoming more and more sophisticated, requiring more efficient and highly flexible compilers. Engineers are discovering that many of the compilers in use today are ill-suited to meet the demands of more advanced computer architectures.

Updated to include the latest techniques, The
...
Computational Intelligence: Concepts to Implementations
Computational Intelligence: Concepts to Implementations
Russ Eberhart and Yuhui Shi have succeeded in integrating various natural and engineering disciplines to establish Computational Intelligence. This is the first comprehensive textbook, including lots of practical examples. Professor Shun-ichi Amari, RIKEN Brain Science Institute, Japan

Computational Intelligence describes a large,
...
How to Cheat at Deploying and Securing RFID
How to Cheat at Deploying and Securing RFID
RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ pass to dogs to beer kegs to library books.

For security
...
Source Code China: The New Global Hub of IT (Information Technology) Outsourcing
Source Code China: The New Global Hub of IT (Information Technology) Outsourcing
Source Code China

The New Global Hub of IT Outsourcing

Welcome to the new technology outsourcing services industry reality: China!

The factors that point to a country's potential and success as an outsourcing destination inevitably lead to the one country that is rapidly becoming the new hub for IT...

Hybrid Systems: Computation and Control: 7th International Workshop, HSCC 2004, Philadelphia, PA, USA, March 25-27, 2004, Proceedings
Hybrid Systems: Computation and Control: 7th International Workshop, HSCC 2004, Philadelphia, PA, USA, March 25-27, 2004, Proceedings
This book constitutes the refereed proceedings of the 7th International Workshop on Hybrid Systems: Computation and Control, HSCC 2004, held in Philadelphia, PA, USA, in March 2004.

The 43 revised full papers presented together with an invited article were carefully reviewed and selected from 117 submissions. The papers address all current...

Professional Python Frameworks: Web 2.0 Programming with Django and Turbogears (Programmer to Programmer)
Professional Python Frameworks: Web 2.0 Programming with Django and Turbogears (Programmer to Programmer)
As two of the leading MVC web frameworks for Python, Django and TurboGears allow you to develop and launch sites in a fraction of the time compared to traditional techniques and they provide greater stability, scalability, and management than alternatives. Packed with examples, this book will help you discover a new methodology for designing,...
Cellular Automata: 7th International Conference on Cellular Automata for Research and Industry, ACRI 2006, Perpignan, France, September 20-23, 2006,   Proceedings
Cellular Automata: 7th International Conference on Cellular Automata for Research and Industry, ACRI 2006, Perpignan, France, September 20-23, 2006, Proceedings
This book constitutes the refereed proceedings of the 7th International Conference on Cellular Automata for Research and Industry, ACRI 2006, held in Perpignan, France in September 2006.

The 53 revised full papers and 19 revised poster papers presented together with 6 invited lectures were carefully reviewed and selected from around 100...

Cellular Automata: 6th International Conference on Cellular Automata for Research and Industry, ACRI 2004, Amsterdam
Cellular Automata: 6th International Conference on Cellular Automata for Research and Industry, ACRI 2004, Amsterdam
This book constitutes the refereed proceedings of the 6th International Conference on Cellular Automata for Research and Industry, ACRI 2004, held in Amsterdam, The Netherlands in October 2004.

The 60 revised full papers and 30 poster papers presented were carefully reviewed and selected from 150 submissions. The papers are devoted to methods...

SUSE Linux Toolbox: 1000+ Commands for openSUSE and SUSE Linux Enterprise
SUSE Linux Toolbox: 1000+ Commands for openSUSE and SUSE Linux Enterprise
After you’ve had some experience with Linux, you don’t need someone telling you to click the Help button for help or drag a file to the Trash icon to delete it. What you need is a reference book that shows you powerful commands and options that let you take hold of your Linux system, as well as the processes, users, storage media,...
Next Generation IPTV Services and Technologies
Next Generation IPTV Services and Technologies
Detailed coverage of the underlying technologies required to build an end-to-end IPTV system

The television entertainment industry is currently experiencing a major transformation as broadband subscribers and improvements in compression techniques for digital video content continue to grow. This growth is fueling the demand for a new generation...

CWNA Certified Wireless Network Administrator Official Study Guide (Exam PW0-100), Fourth Edition
CWNA Certified Wireless Network Administrator Official Study Guide (Exam PW0-100), Fourth Edition

This book focuses on the objectives for the CWNA exam, but it's also a useful learning tool for anyone wanting to master the many domains of wireless. You’ll learn about wireless technology basics such as radio frequency—based communications, and you’ll learn about specific standards and protocols that ...

Result Page: 265 264 263 262 261 260 259 258 257 256 255 254 253 252 251 250 249 248 247 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy