Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced Technologies in Robotics and Intelligent Systems: Proceedings of ITR 2019 (Mechanisms and Machine Science)
Advanced Technologies in Robotics and Intelligent Systems: Proceedings of ITR 2019 (Mechanisms and Machine Science)

This volume gathers the latest advances, innovations, and applications in the field of intelligent systems such as robots, cyber-physical and embedded systems, as presented by leading international researchers and engineers at the International Conference on Intelligent Technologies in Robotics (ITR), held in Moscow, Russia on...

Classification and Data Mining (Studies in Classification, Data Analysis, and Knowledge Organization)
Classification and Data Mining (Studies in Classification, Data Analysis, and Knowledge Organization)

This volume contains both methodological papers showing new original methods, and papers on applications illustrating how new domain-specific knowledge can be made available from data by clever use of data analysis methods. The volume is subdivided in three parts: Classification and Data Analysis; Data Mining; and Applications. The selection...

Computer Networks (5th Edition)
Computer Networks (5th Edition)

This book is now in its fifth edition. Each edition has corresponded to a different phase in the way computer networks were used. When the first edition appeared in 1980, networks were an academic curiosity. When the second edition appeared in 1988, networks were used by universities and large businesses. When the third edition appeared in...

Social Media Tools in Experiential Internship Learning
Social Media Tools in Experiential Internship Learning

This book describes how a support structure can be built to enhance peer-to-peer (and also students-to-lecturers) communication and support. It informs lecturers on how they can decide if they should adopt one or more social media tools to facilitate students’ learning, communication, and support for an internship program. This...

Natural Hazards GIS-Based Spatial Modeling Using Data Mining Techniques (Advances in Natural and Technological Hazards Research)
Natural Hazards GIS-Based Spatial Modeling Using Data Mining Techniques (Advances in Natural and Technological Hazards Research)
This edited volume assesses capabilities of data mining algorithms for spatial modeling of natural hazards in different countries based on a collection of essays written by experts in the field. The book is organized on different hazards including landslides, flood, forest fire, land subsidence, earthquake, and gully erosion. Chapters were...
Absolute Beginner's Guide to Personal Firewalls
Absolute Beginner's Guide to Personal Firewalls

The Absolute Beginner's Guide to Personal Firewalls is designed to provide simplified, yet thorough firewall information on the most prevalent personal firewall software applications available for the non expert firewall consumer. In addition, it offers information and links to Web sites that will help you test your security after your personal...

Innovations in Remote Sensing and Photogrammetry (Lecture Notes in Geoinformation and Cartography)
Innovations in Remote Sensing and Photogrammetry (Lecture Notes in Geoinformation and Cartography)

Remote sensing of our environment is becoming increasingly accessible and important in today’s society. This book aims to highlight some of the broad and multi-disciplinary applications, and emerging practices, that remote sensing and photogrammetric technologies lend themselves to. The papers have been selected from the 13th and 14th...

AD HOC NETWORKS: Technologies and Protocols
AD HOC NETWORKS: Technologies and Protocols
Wireless mobile networks and devices are becoming increasingly popular as
they provide users access to information and communication anytime and anywhere.
Conventional wireless mobile communications are usually supported
by a wired fixed infrastructure. A mobile device would use a single-hop wireless
radio communication to
...
Internet Communications Using SIP: Delivering VoIP and Multimedia Services with Session Initiation Protocol
Internet Communications Using SIP: Delivering VoIP and Multimedia Services with Session Initiation Protocol
"This book is like a good tour guide.It doesn't just describe the major attractions; you share in the history, spirit, language, and culture of the place."
—Henning Schulzrinne, Professor, Columbia University

Since its birth in 1996, Session Initiation Protocol (SIP) has grown up. As a richer, much more robust...

Foundations and Novel Approaches in Data Mining (Studies in Computational Intelligence)
Foundations and Novel Approaches in Data Mining (Studies in Computational Intelligence)
Data-mining has become a popular research topic in recent years for the treatment of the "data rich and information poor" syndrome. Currently, application oriented engineers are only concerned with their immediate problems, which results in an ad hoc method of problem solving. Researchers, on the other hand, lack an understanding of the...
Skype Hacks: Tips & Tools for Cheap, Fun, Innovative Phone Service
Skype Hacks: Tips & Tools for Cheap, Fun, Innovative Phone Service

If you've heard about Skype--and who hasn't with all the recent media attention devoted to internet telephone services--chances are you've been mighty tempted to try it out. Skype Hacks tells you what all the Skype hype is about, explains the basics, and shows you more than 100 clever tips and...

Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

Result Page: 27 26 25 24 23 22 21 20 19 18 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy