Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Next Wave in Computing, Optimization, and Decision Technologies
The Next Wave in Computing, Optimization, and Decision Technologies
Brown et al. (2004) (see also Reed 1994 and Skroch 2004) model the
completion of an adversarial nation’s nuclear-weapons program using
general techniques of PERT. (See PERT 1958 and Malcolm et al. 1959
for the original descriptions of PERT, and see Moder et al. 1983 for a
comprehensive review.) Brown et al. (2004) ask the
...
Acoustic Diffusers and Absorbers: Theory, Design and Application
Acoustic Diffusers and Absorbers: Theory, Design and Application
Every book tells a story and there is a story behind every book. This story begins in 1980, in the conference room of the laboratory for the structure of matter at the Naval Research Laboratory (NRL) in Washington, DC, where Peter D’Antonio was employed as a diffraction physicist. Knowing Peter’s interest in music, a colleague handed...
Introduction to Biometrics
Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic commerce, and welfare disbursement require reliable person recognition systems. Traditional person authentication methods based on passwords and identity documents often fail to meet the stringent security and performance demands of these...
Principles and Practice of Pediatric Surgery
Principles and Practice of Pediatric Surgery
In the preface to the text that preceded this edition, we predicted that the pace of change in the clinical practice of pediatric surgery, and in our understanding of the scientific principles that are the basis for that practice, would soon render the text obsolete. That expectation was more predictable than prescient,...
Calcium Signalling in Cancer
Calcium Signalling in Cancer

Calcium signalling occupies a preeminent position in the signal transduction system of the cell by virtue of its participation in a wide range of physiological functions together with the biological events associated with genetic expression, cell proliferation and apoptosis, as well as cell differentiation and morphogenesis. It is an...

Advanced Linux Networking
Advanced Linux Networking

With an increasing number of networks and mission-critical applications running on Linux, system and network administrators must be able to do more than set up a server and rely on its default configuration. Advanced Linux Networking is designed to help you achieve a higher level of competence. It focuses on powerful...

Advanced Wireless Communications: 4G Technologies
Advanced Wireless Communications: 4G Technologies
The wireless community is on the verge of the standardization of fourth generation (4G) systems.  Research has generated a number of solutions for significant improvement of system performance.  The development of enabling technologies such as adaptive coding and modulation, iterative (turbo) decoding algorithms and space-time coding,...
Strategies for Managing Is/It Personnel
Strategies for Managing Is/It Personnel

As IT staff shortages are being experienced worldwide, with a huge gap between the number of positions available for IS/IT workers and the number of available qualified workers to fill them. The major factors that have contributed to the IS/IT crisis include lack of understanding of the career orientations of IS personnel; high IS staff...

Professional haXe and Neko
Professional haXe and Neko
Professional haXe and Neko

haXe is an exciting new programming language, as well as a compiler and a framework, that can be used to build web applications and write code aimed at multiple platforms on an array of operating systems. Neko is a fast, flexible, and reliable cross-platform virtual machine that allows for the...

Microsoft  Windows  Administrator's Automation Toolkit (Pro-One-Offs)
Microsoft Windows Administrator's Automation Toolkit (Pro-One-Offs)
Welcome to Microsoft® Windows® Administrator’s Automation Toolkit. This book is designed to help you quickly automate over 100 common Windows administrative tasks. In some cases, I show you how to automate tasks using existing tools such as those included with the Windows operating system or those available for download from the Web....
Secure Coding in C and C++
Secure Coding in C and C++

"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append...

Modeling of Curves and Surfaces with MATLAB®
Modeling of Curves and Surfaces with MATLAB®

This text on geometry modeling is devoted to a number of central geometrical topics— graphs of functions, transformations, (non-)Euclidean geometries, curves and surfaces— and presents some elementary methods for analytical modeling and visualization of them.

In 1872 F. Klein proposed his Erlangen Programme in...

unlimited object storage image
Result Page: 295 294 293 292 291 290 289 288 287 286 285 284 283 282 281 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy