Home | Amazing | Today | Tags | Publishers | Years | Search 
Multicriteria Scheduling: Theory, Models and Algorithms
Multicriteria Scheduling: Theory, Models and Algorithms
Scheduling theory first appears in the mid 1950s. Since then the problems
addressed become closer to industrial applications, thus increasing in complexity.
The layout of the shops taken into account are closer and closer to
those met in practice: we encounter shops where the machines are found in
different multiple copies,
...
Microsoft Windows XP Power Optimization
Microsoft Windows XP Power Optimization
Want a Faster and More Powerful PC? It's There on Your Desk.

Eventually, it will be time to buy a new PC or put money into an upgrade, but Microsoft Windows XP Power Optimization shows you how to get the most out of your current equipment right now, simply by tuning your Windows setup.
...
Practical Modern SCADA Protocols: DNP3, 60870.5 and Related Systems (IDC Technology)
Practical Modern SCADA Protocols: DNP3, 60870.5 and Related Systems (IDC Technology)
This is a comprehensive book covering the essentials of SCADA communication systems focusing on
DNP3 and the other new developments in this area. It commences with a brief review of the
fundamentals of SCADA systems hardware, software and the typical communications systems (such
as RS-232, RS-485, Ethernet and TCP/IP) that connect
...
Multiprocessor Systems-on-Chips (The Morgan Kaufmann Series in Systems on Silicon)
Multiprocessor Systems-on-Chips (The Morgan Kaufmann Series in Systems on Silicon)
Wolf and Jerraya have struck a delicate balance in the presentation of a specialized body of knowledge that is highly detailed and topic-specific, yet sufficiently wide-ranging to reflect the overall concept of an MPSOC as the next logical step in integrated complex system design. The text provides an eminently accessible and practical view of the...
Building Tag Clouds in Perl and PHP
Building Tag Clouds in Perl and PHP

Tag clouds are everywhere on the web these days. First popularized by the web sites Flickr, Technorati, and del.icio.us, these amorphous clumps of words now appear on a slew of web sites as visual evidence of their membership in the elite corps of "Web 2.0." This PDF analyzes what is and isn't a tag cloud, offers design...

MySQL/PHP Database Applications, 2nd Edition
MySQL/PHP Database Applications, 2nd Edition
Learn what it takes to get data-driven Web sites up and running using PHP 5 and MySQL

The popularity of using MySQL and PHP to create organized and efficient Web sites is growing at a steady pace. MySQL has proven itself to be fast, robust, and easy to use. It works well with PHP, and it’s perfect for Web applications for simple to robust...

Computers and Writing: The Cyborg Era
Computers and Writing: The Cyborg Era
In the mid 1960s, when a single chip contained an average of 50 transistors,
Gordon Moore observed that integrated circuits were doubling in complexity
every year. In an influential article published by Electronics Magazine in 1965,
Moore predicted that this trend would continue for the next 10 years. Despite
being criticized
...
Higher-Level Hardware Synthesis
Higher-Level Hardware Synthesis
In the mid 1960s, when a single chip contained an average of 50 transistors,
Gordon Moore observed that integrated circuits were doubling in complexity
every year. In an influential article published by Electronics Magazine in 1965,
Moore predicted that this trend would continue for the next 10 years. Despite
being criticized
...
Ambient Intelligence: Impact on Embedded System Design
Ambient Intelligence: Impact on Embedded System Design
The emerging Ambient Intelligence vision has the potential to fundamentally change our world. This volume is a preview into the next era of computing. It investigates the impact of Ambient Intelligence on embedded system design. Combining visionary contributions with papers on recent developments, it brings to light the challenges in system design...
Nessus, Snort, & Ethereal Power Tools : Customizing Open Source Security Applications (Jay Beale's Open Source Security)
Nessus, Snort, & Ethereal Power Tools : Customizing Open Source Security Applications (Jay Beale's Open Source Security)
One of the most attractive attributes of Nessus is the simplicity of creating custom extensions (or
plugins) to be run with the Nessus engine.This benefit is gained via the specialized language
NASL (Nessus Attack Scripting Language). NASL supplies the infrastructure to write networkbased
scripts without the need to implement the
...
Head First Design Patterns
Head First Design Patterns

You're not alone. At any given moment, somewhere in the world someone struggles with the same software design problems you have. You know you don't want to reinvent the wheel (or worse, a flat tire), so you look to Design Patterns--the lessons learned by those who've faced the same problems. With Design Patterns, you get to take...

Microsoft Project Version 2002 Inside Out
Microsoft Project Version 2002 Inside Out

This book is designed for intermediate to advanced computer users who manage projects. Even if you have never used Microsoft Project or managed a project before, this book assumes you have experience with Microsoft Windows and at least a couple of programs in Microsoft Office, such as Microsoft Word, Microsoft Excel, and Microsoft Outlook.

...
Result Page: 295 294 293 292 291 290 289 288 287 286 285 284 283 282 281 280 279 278 277 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy