Home | Amazing | Today | Tags | Publishers | Years | Search 
Design of High-Speed Communication Circuits (Selcted Topics in Electronics and Systems)
Design of High-Speed Communication Circuits (Selcted Topics in Electronics and Systems)

Welcome to the special issue of the International Journal of High Speed Electronics and Systems on "High-Speed Mixed-Signal Integrated Circuits". Silicon, in particular MOS silicon, has rapidly become the de facto technology for mixed-signal integrated circuit design due to the high levels of integration possible as device...

Windows PowerShell in Action, Second Edition
Windows PowerShell in Action, Second Edition

Well, it’s been a wild ride since the first edition of this book was released. At that time, PowerShell had just shipped and had a fairly limited scope of influence. Things have changed a lot. PowerShell now ships in the box with Windows (at least Windows 7 and Server 2008 R2). The number of PowerShell users is now in the hundreds...

VMware vSphere PowerCLI Reference: Automating vSphere Administration
VMware vSphere PowerCLI Reference: Automating vSphere Administration

The book is, of course, primarily targeted at administrators of vSphere environments who want to automate tasks. But the subjects that we discuss in the book cover so many aspects of the management of a VMware vSphere environment that everyone who comes into contact with a VMware vSphere environment will be able to pick up something...

Computers and Intractability: A Guide to the Theory of NP-Completeness (Series of Books in the Mathematical Sciences)
Computers and Intractability: A Guide to the Theory of NP-Completeness (Series of Books in the Mathematical Sciences)

Few technical lerms have gained such rapid notoriety as the appela tion "NP-complete." In the short lime since its introduction in the early 1970's, this term has come to symbolize the abyss of inherent intractability that algorithm designers increasingly face as they seek to solve larger and more complex problems. A...

Security in Computing Systems: Challenges, Approaches and Solutions
Security in Computing Systems: Challenges, Approaches and Solutions

This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of secu rity with respect to computing. Here, “computing” refers to all activities which individuals or groups directly or indirectly perform by means of computing sys tems,...

Application Security for the Android Platform: Processes, Permissions, and Other Safeguards
Application Security for the Android Platform: Processes, Permissions, and Other Safeguards
The purpose of this book is to convey vital knowledge about application security to developers working on the Android platform, to enable the development of robust, rugged, and more secure applications. While application security knowledge and skills have matured rapidly over the past couple of years, that...
Interactive Co-segmentation of Objects in Image Collections (SpringerBriefs in Computer Science)
Interactive Co-segmentation of Objects in Image Collections (SpringerBriefs in Computer Science)

The authors survey a recent technique in computer vision called Interactive Co-segmentation, which is the task of simultaneously extracting common foreground objects from multiple related images. They survey several of the algorithms, present underlying common ideas, and give an overview of applications of object co-segmentation.

We
...
Web Page Recommendation Models: Theory and Algorithms (Synthesis Lectures on Data Management)
Web Page Recommendation Models: Theory and Algorithms (Synthesis Lectures on Data Management)

One of the application areas of data mining is the World Wide Web (WWW or Web), which serves as a huge, widely distributed, global information service for every kind of information such as news, advertisements, consumer information, financial management, education, government, e-commerce, health services, and many other information services....

Boosting-Based Face Detection and Adaptation (Synthesis Lectures on Computer Vision)
Boosting-Based Face Detection and Adaptation (Synthesis Lectures on Computer Vision)
With the rapid increase of computational powers and availability of modern sensing, analysis and rendering equipment and technologies, computers are becoming more and more intelligent. Many research projects and commercial products have demonstrated the capability for a computer to interact with human in a natural way by looking at...
Advancements in Distributed Computing and Internet Technologies: Trends and Issues
Advancements in Distributed Computing and Internet Technologies: Trends and Issues
The concept of the Internet has been a tremendous success by this time. Other than being a great source of fun and enjoyment, millions of people around the world rely on the Internet for various tasks related to their livelihoods. The overwhelming growth of the Internet and its users is now a reality, which has put new thoughts...
The Definitive Guide to HTML5
The Definitive Guide to HTML5
The Hypertext Markup Language (HTML) has been around since the early 1990s. My earliest encounter was somewhere around 1993 or 1994, when I was working at a university research lab not far from London. There was only one browser—NCSA Mosaic—and the number of web servers could be counted on one hand.

...
Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security

Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all...

Result Page: 272 271 270 269 268 267 266 265 264 263 262 261 260 259 258 257 256 255 254 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy