Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Middleware for Communications
Middleware for Communications
"The book addresses telecommunications workers, developers, middleware researchers, software engineers, and software architects." (IT Professional, July/August 2004)

A state-of-the-art guide to middleware technologies, and their pivotal role in communications networks.

Middleware is...

Structured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security
Structured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security

The field of structured P2P systems has seen fast growth upon the introduction of Distributed Hash Tables (DHTs) in the early 2000s. The first proposals, including Chord, Pastry, Tapestry, were gradually improved to cope with scalability, locality and security issues. By utilizing the processing and bandwidth resources  of end users, the...

Beginning Python: From Novice to Professional
Beginning Python: From Novice to Professional

Beginning Python: From Novice to Professional is the most comprehensive book on the Python ever written. Based on Practical Python, this newly revised book is both an introduction and practical reference for a swath of Python-related programming topics, including addressing language internals, database integration, network programming, and...

Adaptive Multimedia Retrieval: Retrieval, User, and Semantics: 5th International Workshop, AMR 2007
Adaptive Multimedia Retrieval: Retrieval, User, and Semantics: 5th International Workshop, AMR 2007

This book is a selection of the revised contributions that were initially submitted to the International Workshop on Adaptive Multimedia Retrieval (AMR 2007). The workshop was organized at the University Pierre and Marie Curie in Paris, France, during July 5–6, 2007.

The goal of the AMR workshops is to intensify the exchange...

Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007
Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007
This book constitutes the refereed proceedings of the 8th International Workshop on Information Security Applications, WISA 2007, held in Jeju Island, Korea, August 27-29, 2007.

The 27 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 95 submissions. The papers are organized in topical...

Optimal Resource Allocation for Distributed Video Communication (Multimedia Computing, Communication and Intelligence)
Optimal Resource Allocation for Distributed Video Communication (Multimedia Computing, Communication and Intelligence)

While most books on the subject focus on resource allocation in just one type of network, this book is the first to examine the common characteristics of multiple distributed video communication systems. Comprehensive and systematic, Optimal Resource Allocation for Distributed Video Communication presents a unified...

XML, Web Services, and the Data Revolution (Technology Series)
XML, Web Services, and the Data Revolution (Technology Series)

"Frank Coyle's XML,Web Services, and the Data Revolution does a great job of explaining the XML phenomenon by clearly describing where it came from, why it has proved so useful, and where it is likely to take us."—Michael Champion

XML, Web Services, and the Data Revolution presents a...

Silverlight 2 Visual Essentials (Firstpress)
Silverlight 2 Visual Essentials (Firstpress)
Silverlight is a lightweight browser plug–in that frees your code from the traditional confines of the browser. It is a rules–changing, groundbreaking technology that allows you to run rich client applications right inside the browser. Even more impressively, it is able to host true .NET applications in non–Microsoft browsers...
The New Accounts Payable Toolkit (Wiley Corporate F&A)
The New Accounts Payable Toolkit (Wiley Corporate F&A)
THE NEW ACCOUNTS PAYABLE TOOLKIT

In The New Accounts Payable Toolkit, accomplished entrepreneur, consultant, and finance expert Christine H. Doxey delivers a unique and powerful approach to the accounts payable process and discusses the impact of the automation of the Procure to Pay (P2P) process. The toolkit explores...

Intelligent Multimedia Communication: Techniques and Applications (Studies in Computational Intelligence)
Intelligent Multimedia Communication: Techniques and Applications (Studies in Computational Intelligence)

Multimedia data are used more and more widely in human being's life, e.g., videoconferencing, visual telephone, IPTV, etc. Nearly most of the applications need multimedia transmission techniques that send multimedia data from one side to another side and keep the properties of efficiency, robustness and security. Here, the efficiency...

Pro ASP.NET 3.5 in C# 2008, Second Edition
Pro ASP.NET 3.5 in C# 2008, Second Edition
ASP.NET 3.5 is the latest version of Microsoft’s revolutionary ASP.NET technology. It is the principal standard for creating dynamic web pages on the Windows platform. Pro ASP.NET 3.5 in C# 2008 raises the bar for high-quality, practical advice on learning and deploying Microsoft’s dynamic web solution.

Seasoned .NET...

Java P2P Unleashed: With JXTA, Web Services, XML, Jini, JavaSpaces, and J2EE
Java P2P Unleashed: With JXTA, Web Services, XML, Jini, JavaSpaces, and J2EE
Java P2P Unleashed provides a single source for Java developers who want to develop P2P systems. The book explains the benefits of each technology and shows how to fit the P2P "pieces" together - both in building new systems and integrating with existing ones. starts with a discussion of the P2P...
unlimited object storage image
Result Page: 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy