Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Introduction to Contextual Processing: Theory and Applications
Introduction to Contextual Processing: Theory and Applications

Contextual computing has been around for several years with a variety of names such as pervasive computation and omnipresent computing. Recently there has been a drive toward making personal digital assistants (PDAs) more aware of their environment. For example, a cell phone may sense that it is in a conference room and reason that it should...

High Performance Browser Networking: What every web developer should know about networking and web performance
High Performance Browser Networking: What every web developer should know about networking and web performance
How prepared are you to build fast and efficient web applications? This eloquent book provides what every web developer should know about the network, from fundamental limitations that affect performance to major innovations for building even more powerful browser applications--including HTTP 2.0 and XHR improvements, Server-Sent Events...
Multimedia Content Encryption: Techniques and Applications
Multimedia Content Encryption: Techniques and Applications

How to Design a Secure Multimedia Encryption Scheme

The widespread use of image, audio, and video data makes media content protection increasingly necessary and urgent. For maximum safety, it is no longer sufficient to merely control access rights. In order to fully protect multimedia data from piracy or...

Skype Hacks: Tips & Tools for Cheap, Fun, Innovative Phone Service
Skype Hacks: Tips & Tools for Cheap, Fun, Innovative Phone Service

If you've heard about Skype--and who hasn't with all the recent media attention devoted to internet telephone services--chances are you've been mighty tempted to try it out. Skype Hacks tells you what all the Skype hype is about, explains the basics, and shows you more than 100 clever tips and...

Digital Business: First International ICST Conference, DigiBiz 2009, London, UK, June 17-19, 2009, Revised Selected Papers
Digital Business: First International ICST Conference, DigiBiz 2009, London, UK, June 17-19, 2009, Revised Selected Papers

This book constitutes the proceedings of the First International ICST Conference, DigiBiz 2009, held in London, UK, in June 2009.

The 19 contributions published in this volume were carefully selected from over 60 submitted works in a rigorous peer-reviewed process.

The papers dealt with subjects like virtual business alliances,...

Video Over IP, Second Edition: IPTV, Internet Video, H.264, P2P, Web TV, and Streaming: A Complete Guide to Understanding the Technology
Video Over IP, Second Edition: IPTV, Internet Video, H.264, P2P, Web TV, and Streaming: A Complete Guide to Understanding the Technology
"I find this book among the better ones, for its systematic approach and clarity of the text...The "Video over IP" book is highly recommended for all practising broadcast engineers."- EBU Techincal Review

?...here is a guide that gives you everything you need to know to find the best solution for your application.? ?
...
Digital Video Distribution in Broadband, Television, Mobile and Converged Networks: Trends, Challenges and Solutions
Digital Video Distribution in Broadband, Television, Mobile and Converged Networks: Trends, Challenges and Solutions

A unique treatment of digital video distribution technology in a business context, Digital Video Distribution in Broadband, Television, Mobile and Converged Networks explores a range of diverse topics within the field through a combination of theory and practice to provide the best possible insight and exposure. The theoretical...

Novel 3D Media Technologies
Novel 3D Media Technologies

This book describes recent innovations in 3D media and technologies, with coverage of 3D media capturing, processing, encoding, and adaptation, networking aspects for 3D Media, and quality of user experience (QoE). The contributions are based on the results of the FP7 European Project ROMEO, which focuses on new methods for the compression...

Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-to-peer (P2P) has proven as a most successful way to produce large scale, reliable, and cost-effective applications, as illustrated for file sharing or VoIP. P2P storage is an emerging field of application which allows peers to collectively leverage their resources towards ensuring the reliability and availability of user...
Autonomic Communication
Autonomic Communication

New paradigms for communication/networking systems are needed in order to tackle such emerging issues as heterogeneity, complexity and management of evolvable infrastructures, thus requiring approaches that are both task- and knowledge-driven. The networking and seamless integration of concepts, technologies and devices in a dynamically changing...

Advanced Web Technologies and Applications
Advanced Web Technologies and Applications
This book constitutes the refereed proceedings of the 6th Asia-Pacific Web Conference, APWeb 2004, held in Hangzhou, China, in April 2004.

The 60 revised full papers, 24 revised short papers, 15 revised poster papers, and 3 revised industrial papers presented together with 3 keynote papers and 3 invited papers were carefully reviewed and...

Self-* and P2P for Network Management: Design Principles and Case Studies (SpringerBriefs in Computer Science)
Self-* and P2P for Network Management: Design Principles and Case Studies (SpringerBriefs in Computer Science)

The network management community has been pushed towards the design of alternative management approaches able to support heterogeneity, scalability, reliability, and minor human intervention. The employment of self-* properties and Peer-To-Peer (P2P) are seen as promising alternatives, able to provide the sophisticated solutions required.

...
Result Page: 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy