Home | Amazing | Today | Tags | Publishers | Years | Search 
Silicon Photonics: An Introduction
Silicon Photonics: An Introduction
The observation by Gordon Moore in 1965 (now universally referred to as Moore’s law) that the number of transistors on an integrated circuit would double every couple of years has become a beacon that continues to drive the electronics industry. Integrated circuits have grown exponentially from the 30-transistor devices of 1965 to...
The Man Who Loved Only Numbers
The Man Who Loved Only Numbers

An affectionate if impressionistic portrayal of one of the century's greatest and strangest mathematicians. Though little known among nonmathematicians, Erdos, who died in 1996 at age 83, was a legend among his colleagues. According to Hoffman (Archimedes' Revenge, 1988), the Hungarian was so devoted to mathematics that he went without...

Omnipage Power!
Omnipage Power!
With substantially increased accuracy and the ability to convert both scanned documents and PDF files into editable text and images for use in computer software applications such as MS Word and Excel, OmniPage Pro 11 has become an essential tool for the digital workplace. "OmniPage Power!" is here to help you make maximum use of the...
Behavioral Biometrics: A Remote Access Approach
Behavioral Biometrics: A Remote Access Approach

With the advent of the internet as a medium for performing business transactions, the need for a secure communication channel has never been more paramount. The study of behavioral biometrics - the verification and/or identification of individuals based on the way they provide information to an authentication system - originated from the need...

Algorithms Sequential & Parallel: A Unified Approach (Electrical and Computer Engineering Series)
Algorithms Sequential & Parallel: A Unified Approach (Electrical and Computer Engineering Series)
A major thrust of computer science is the design, analysis, implementation, and scientific evaluation of algorithms to solve critical problems. In addition, new challenges are being offered to computer scientists in the field of computational science and engineering, which includes challenging problems in computational biology, computational fluid...
Collective Intelligence in Action
Collective Intelligence in Action
There's a great deal of wisdom in a crowd, but how do you listen to a thousand people talking at once? Identifying the wants, needs, and knowledge of internet users can be like listening to a mob.

In the Web 2.0 era, leveraging the collective power of user contributions, interactions, and feedback is the key to market dominance. A new...

Geocomputation and Urban Planning (Studies in Computational Intelligence)
Geocomputation and Urban Planning (Studies in Computational Intelligence)
Sixteen years ago, Franklin estimated that about 80% of data contain geo-referenced information. To date, the availability of geographic data and information is growing, together with the capacity of users to operate with IT tools and instruments. Spatial data infrastructures are growing and allow a wide number of users to rely on them. This growth...
Software Engineering: International Summer Schools, ISSSE 2006-2008, Salerno, Italy, Revised Tutorial Lectures
Software Engineering: International Summer Schools, ISSSE 2006-2008, Salerno, Italy, Revised Tutorial Lectures
Software engineering is widely recognized as one of the most exciting, stimulating, and profitable research areas, with a significant practical impact on the software industry. Thus, training future generations of software engineering researchers and bridging the gap between academia and industry are vital to the field. The International Summer...
Personalized Information Retrieval and Access: Concepts, Methods and Practices (Premier Reference Source)
Personalized Information Retrieval and Access: Concepts, Methods and Practices (Premier Reference Source)
Global information retrieval and anywhere, anytime information access has stimulated a need to design and model the personalized information search in a flexible and agile way that can use the specific personalization techniques, algorithms, and available technology infrastructure to satisfy high-level functional requirements for personalization....
SAP Security: SAP Security Essentials
SAP Security: SAP Security Essentials
I have found that a of the materials available in SAP security are either 1) nonexistent 2) too general and pedantic in nature 3) sales materials in disguise. And since there are a very limited number of published books in the area of SAP security, this title was a natural addition to our growing library of practical references for SAP consultants...
Coaching Made Easy: Step-By-Step Techniques That Get Results
Coaching Made Easy: Step-By-Step Techniques That Get Results

Have you ever wanted to make change happen more easily? Do you want to harness the power of coaching? If so help is at hand, as the simple three-step process in this book can help anyone become a coaching expert.

Easy to understand and apply, the authors’ ABC technique will give you a solid understanding of what to do and when to...

MCSE Windows 2000 Active Directory Services Infrastructure Exam Cram 2 (Exam 70-217)
MCSE Windows 2000 Active Directory Services Infrastructure Exam Cram 2 (Exam 70-217)
MCSE Windows 2000 Active Directory Services Infrastructure Exam Cram 2 (Exam 70-217) is the perfect study guide to help you pass one of the four core exams in Microsoft's Windows 2000 certification program. This certification exam measures the ability to install, configure, and troubleshoot the Windows 2000 Active Directory components, DNS for...
Result Page: 255 254 253 252 251 250 249 248 247 246 245 244 243 242 241 240 239 238 237 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy