Home | Amazing | Today | Tags | Publishers | Years | Search 
Design to Thrive: Creating Social Networks and Online Communities that Last
Design to Thrive: Creating Social Networks and Online Communities that Last

Social networks and online communities are reshaping the way people communicate, both in their personal and professional lives. What makes some succeed and others fail? What draws a user in? What makes them join? What keeps them coming back? Entrepreneurs and businesses are turning to user experience practitioners to figure this out. Though...

WordPress 24-Hour Trainer: Watch, Read, and Learn How to Create and Customize WordPress Sites
WordPress 24-Hour Trainer: Watch, Read, and Learn How to Create and Customize WordPress Sites

Don't let WordPress intimidate you. WordPress 24-Hour Trainer is a unique lesson-based book that walks you through the essential parts of WordPress. Each lesson is streamlined to teach a specific aspect of WordPress, helping you to focus on just what you need in order to get the task accomplished. If you learn better visually,...

Intelligent Multimedia Communication: Techniques and Applications (Studies in Computational Intelligence)
Intelligent Multimedia Communication: Techniques and Applications (Studies in Computational Intelligence)

Multimedia data are used more and more widely in human being's life, e.g., videoconferencing, visual telephone, IPTV, etc. Nearly most of the applications need multimedia transmission techniques that send multimedia data from one side to another side and keep the properties of efficiency, robustness and security. Here, the efficiency...

Developments and Challenges for Autonomous Unmanned Vehicles: A Compendium
Developments and Challenges for Autonomous Unmanned Vehicles: A Compendium

It is widely anticipated that autonomous vehicles will have a transformational impact on military forces and will play a key role in many future force structures. As a result, many tasks have already been identified that unmanned systems could undertake more readily than humans. However, for this to occur, such systems will need to be agile,...

Social Computing: Concepts, Methodologies, Tools, and Applications
Social Computing: Concepts, Methodologies, Tools, and Applications

Social Computing: Concepts, Methodologies, Tools, and Applications uncovers the growing and expanding phenomenon of human behavior, social constructs, and communication in online environments. This multiple volume publication presents the latest research on social change, evolving networks, media, and interaction with technology to offer...

Domain-Specific Model-Driven Testing
Domain-Specific Model-Driven Testing

Software reuse and software quality are increasingly important topics in today's software engineering both for researchers and for practitioners. The design and implementation of tests is especially challenging when tests are conceptualized for different variants and versions of an application. Stefan Baerisch applies a combination of...

Pro WPF in VB 2010 (Beginning)
Pro WPF in VB 2010 (Beginning)

Microsoft’s Windows Presentation Foundation (WPF) provides the foundation for building applications and high-quality user experiences for the Windows operating system. It blends the application user interface, documents, and media content, while exploiting the full power of your computer’s operating system.

Its...

Secrets of the Millionaire Mind: Mastering the Inner Game of Wealth
Secrets of the Millionaire Mind: Mastering the Inner Game of Wealth

SECRETS OF THE MILLIONAIRE MIND reveals the missing link between wanting success and achieving it!

Have you ever wondered why some people seem to get rich easily, while others are destined for a life of financial struggle? Is the difference found in their education, intelligence, skills, timing, work habits, contacts, luck, or...

Advances in Artificial Intelligence for Privacy Protection and Security
Advances in Artificial Intelligence for Privacy Protection and Security

In this book, we aim to collect the most recent advances in artificial intelligence techniques (i.e. neural networks, fuzzy systems, multi-agent systems, genetic algorithms, image analysis, clustering, etc), which are applied to the protection of privacy and security. The symbiosis between these fields leads to a pool of invigorating ideas,...

Mobilized Marketing and the Consumer: Technological Developments and Challenges
Mobilized Marketing and the Consumer: Technological Developments and Challenges

Mobilized Marketing and the Consumer: Technological Developments and Challenges explores technological developments and widespread issues concerning the explosion of mobile devices in the information age. Providing breakthrough research on topics such as Bluetooth, mobile phones, and online portals, this innovative publication...

Embedded Software Design and Programming of Multiprocessor System-on-Chip: Simulink and System C Case Studies
Embedded Software Design and Programming of Multiprocessor System-on-Chip: Simulink and System C Case Studies

Current multimedia and telecom applications require complex, heterogeneous multiprocessor system on chip (MPSoC) architectures with specific communication infrastructure in order to achieve the required performance. Heterogeneous MPSoC includes different types of processing units (DSP, microcontroller, ASIP) and different communication...

A New History of the Peloponnesian War
A New History of the Peloponnesian War

This stimulating new study provides a narrative of the monumental conflict of the Peloponnesian War between Athens and Sparta, and examines the realities of the war and its effects on the average Athenian.

  • A penetrating new study of the Peloponnesian War between Athens and Sparta by an established scholar
    ...
Result Page: 199 198 197 196 195 194 193 192 191 190 189 188 187 186 185 184 183 182 181 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy