Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Recent Developments in Intelligent Computing, Communication and Devices: Proceedings of ICCD 2017 (Advances in Intelligent Systems and Computing, 752)
Recent Developments in Intelligent Computing, Communication and Devices: Proceedings of ICCD 2017 (Advances in Intelligent Systems and Computing, 752)

This book offers a collection of high-quality, peer-reviewed research papers presented at the International Conference on Intelligent Computing, Communication and Devices (ICCD 2017), discussing all dimensions of intelligent sciences – intelligent computing, intelligent communication, and intelligent devices.

...

VACCINE SCIENCE REVISITED: Are Childhood Immunizations As Safe As Claimed? (The Underground Knowledge Series)
VACCINE SCIENCE REVISITED: Are Childhood Immunizations As Safe As Claimed? (The Underground Knowledge Series)
An unbiased, neutral, fact-based investigation that simply allows the science to do the talking on childhood vaccinations. Written by father and son investigative journalism/research team Lance & James Morcan, with a foreword by medical laboratory scientist Elísabet Norris, VACCINE SCIENCE REVISITED is possibly the most...
IPSec VPN Design
IPSec VPN Design

Master IPSec-based Virtual Private Networks with guidance from the Cisco Systems® VPN Solutions group

  • Understand how IPSec VPNs are designed, built, and administered

  • Improve VPN performance through enabling of modern VPN services...

Interdomain Multicast Routing: Practical Juniper Networks and Cisco Systems Solutions
Interdomain Multicast Routing: Practical Juniper Networks and Cisco Systems Solutions

Increasing numbers of ISPs have begun implementing multicast infrastructure. Soon the Internet will provide multicast connectivity between any two points on the Internet the way it provides for unicast traffic today. Long-evolving protocols are reaching maturity, and enterprise networks and ISPs around the world are ramping...

Computer Supported Cooperative Work and Social Computing: 13th CCF Conference, ChineseCSCW 2018, Guilin, China, August 18–19, 2018, Revised Selected ... in Computer and Information Science, 917)
Computer Supported Cooperative Work and Social Computing: 13th CCF Conference, ChineseCSCW 2018, Guilin, China, August 18–19, 2018, Revised Selected ... in Computer and Information Science, 917)
Welcome to ChineseCSCW 2018, the 13th CCF Conference on Computer Supported Cooperative Work and Social Computing. ChineseCSCW 2018 was sponsored by the China Computer Federation (CCF), and co-organized by the Technical Committee on Cooperative Computing (TCCC) of CCF and Guilin University of Technology. The...
Swarm Intelligence in Data Mining (Studies in Computational Intelligence)
Swarm Intelligence in Data Mining (Studies in Computational Intelligence)
Science is a swarm.

To the layperson, the stereotypical scientist is logical, clear-thinking, wellinformed but perhaps socially awkward, carefully planning his or her experiments and then analyzing the resulting data deliberately, with precision. The scientist works alone, emotion-free, searching only for truth, having been well advised
...
AD HOC NETWORKS: Technologies and Protocols
AD HOC NETWORKS: Technologies and Protocols
Wireless mobile networks and devices are becoming increasingly popular as
they provide users access to information and communication anytime and anywhere.
Conventional wireless mobile communications are usually supported
by a wired fixed infrastructure. A mobile device would use a single-hop wireless
radio communication to
...
Internet Communications Using SIP: Delivering VoIP and Multimedia Services with Session Initiation Protocol
Internet Communications Using SIP: Delivering VoIP and Multimedia Services with Session Initiation Protocol
"This book is like a good tour guide.It doesn't just describe the major attractions; you share in the history, spirit, language, and culture of the place."
—Henning Schulzrinne, Professor, Columbia University

Since its birth in 1996, Session Initiation Protocol (SIP) has grown up. As a richer, much more robust...

Foundations and Novel Approaches in Data Mining (Studies in Computational Intelligence)
Foundations and Novel Approaches in Data Mining (Studies in Computational Intelligence)
Data-mining has become a popular research topic in recent years for the treatment of the "data rich and information poor" syndrome. Currently, application oriented engineers are only concerned with their immediate problems, which results in an ad hoc method of problem solving. Researchers, on the other hand, lack an understanding of the...
Skype Hacks: Tips & Tools for Cheap, Fun, Innovative Phone Service
Skype Hacks: Tips & Tools for Cheap, Fun, Innovative Phone Service

If you've heard about Skype--and who hasn't with all the recent media attention devoted to internet telephone services--chances are you've been mighty tempted to try it out. Skype Hacks tells you what all the Skype hype is about, explains the basics, and shows you more than 100 clever tips and...

Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

International Conference on Innovative Computing and Communications: Proceedings of ICICC 2018, Volume 1 (Lecture Notes in Networks and Systems (55))
International Conference on Innovative Computing and Communications: Proceedings of ICICC 2018, Volume 1 (Lecture Notes in Networks and Systems (55))

The book includes high-quality research papers presented at the International Conference on Innovative Computing and Communication (ICICC 2018), which was held at the Guru Nanak Institute of Management (GNIM), Delhi, India on 5–6 May 2018. Introducing the innovative works of scientists, professors, research scholars, students...

unlimited object storage image
Result Page: 28 27 26 25 24 23 22 21 20 19 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy