Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities...
IP Over WDM
IP Over WDM

IP over WDM explores the coming together of communication and computer networking technologies: optical fiber using WDM (Wavelength Division Multiplexing) and IP - the Internet Protocol.

Fiber optics technology is revolutionizing the telecommunications and networking industries by offering the enormous capacity required to...

Human - Computer Systems Interaction: Backgrounds and Applications 2: Part 1
Human - Computer Systems Interaction: Backgrounds and Applications 2: Part 1
A new procedure for combined validation of learning models – built for specifically uncertain data – is briefly described. The procedure, called the queue validation, relies on a combination of resubstitution with the modified learn-andtest paradigm. In the initial experiment [Burda and Hippe 2010] the developed...
Cloud and Fog Computing in 5G Mobile Networks: Emerging Advances and Applications (Iet Telecommunications)
Cloud and Fog Computing in 5G Mobile Networks: Emerging Advances and Applications (Iet Telecommunications)

Now diffused among end-user devices in mobile and wireline networks, the "cloud" is becoming the "fog." This book focuses on the challenges and solutions related to cloud and fog computing for 5G mobile networks and presents novel approaches to the frameworks and schemes that carry out storage, communication, computation,...

Hands-On Reactive Programming with Python: Event-driven development unraveled with RxPY
Hands-On Reactive Programming with Python: Event-driven development unraveled with RxPY

A comprehensive guide to help you understand the principles of Reactive and asynchronous programming and its benefits

Key Features

  • Explore the advantages of Reactive programming
  • Use concurrency and parallelism in RxPY to build powerful reactive applications
  • ...
Post-War Eugenics, Reproductive Choices and Population Policies in Greece, 1950s–1980s
Post-War Eugenics, Reproductive Choices and Population Policies in Greece, 1950s–1980s
This book sheds light on the history of Greek eugenics during the post-war period. At this time, eugenics had already been condemned by international declarations. Alexandra Barmpouti, however, challenges the assumption that eugenics disappeared and confirms the continuity of eugenics after the Second World War. She looks at the Greek...
Advanced Video Coding: Principles and Techniques (Advances in Image Communication)
Advanced Video Coding: Principles and Techniques (Advances in Image Communication)
In recent years, the paradigm of video coding has shifted from that of a frame-based approach to a content-based approach, particularly with the finalization of the ISO multimedia coding standard, MPEG-4. MPEG-4 is the emerging standard for the coding of multimedia content. It defines a syntax for a set of content-based functionalities, namely,...
Sets, Logic and Maths for Computing (Undergraduate Topics in Computer Science)
Sets, Logic and Maths for Computing (Undergraduate Topics in Computer Science)
This book equips the student with essential intellectual tools that are needed from the very beginning of university studies in computing. These consist of abilities and skills - to pass from a concrete problem to an abstract representation, reason with the abstract structure coherently and usefully, and return with booty to the specific situation....
LINQ for Visual C# 2005
LINQ for Visual C# 2005

C# programmers of every level need to learn about LINQ (Language-Integrated Query), Microsofts breakthrough technology for simplifying and unifying data access from any data source. With LINQ you can write more elegant and flexible code, not just to access databases and files, but also to manipulate data structures and XML.

LINQ for...

Modelling and Simulation: Exploring Dynamic System Behaviour
Modelling and Simulation: Exploring Dynamic System Behaviour
The application of modelling and simulation is unconstrained by discipline boundaries. It provides support for the planning, design and evaluation of system behaviour, as well as the evaluation of strategies for dynamic system transformation and change.

Modelling and Simulation: Exploring Dynamic System Behaviour provides the reader...

Neural Network Design and the Complexity of Learning
Neural Network Design and the Complexity of Learning

Using the tools of complexity theory, Stephen Judd develops a formal description of associative learning in connectionist networks. He rigorously exposes the computational difficulties in training neural networks and explores how certain design principles will or will not make the problems easier.

Judd looks beyond the scope
...

Restoring the Innovative Edge: Driving the Evolution of Science and Technology (Innovation and Technology in the World Economy)
Restoring the Innovative Edge: Driving the Evolution of Science and Technology (Innovation and Technology in the World Economy)

Considerable evidence indicates that the U.S. is falling behind when it comes to innovation. In part, this shift stems from the globalization of research and the advancement of other nations. But, it also arises from a widespread failure to adapt to the competitive environment generated by the evolution of science and technology.
The
...

unlimited object storage image
Result Page: 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy