Home | Amazing | Today | Tags | Publishers | Years | Search 
Mobile WiMAX (Wiley - IEE)
Mobile WiMAX (Wiley - IEE)

With the wide and rapid deployment of wireless LANs technology, WiMAX is an emerging technology in wireless communication and is one of the hottest subjects in wireless communications.

Mobile WiMAX is based on selected papers and plenary speeches from the 2007 IEEE Mobile WiMAX Symposium, this book provides...

Bioinformatics Algorithms: Techniques and Applications (Wiley Series in Bioinformatics)
Bioinformatics Algorithms: Techniques and Applications (Wiley Series in Bioinformatics)
Presents algorithmic techniques for solving problems in bioinformatics, including applications that shed new light on molecular biology

This book introduces algorithmic techniques in bioinformatics, emphasizing their application to solving novel problems in post-genomic molecular biology. Beginning with a thought-provoking discussion on the...

Techniques and Tools for the Design and Implementation of Enterprise Information Systems
Techniques and Tools for the Design and Implementation of Enterprise Information Systems
Inter-organizational information systems play a major role in improving communication and integration between partnering firms to achieve an integrated global supply chain. Current research in enterprise resource planning and electronic commerce is crucial to maintaining efficient supply chain management and organizational competitiveness....
Artificial Intelligence for Games (The Morgan Kaufmann Series in Interactive 3D Technology)
Artificial Intelligence for Games (The Morgan Kaufmann Series in Interactive 3D Technology)
"This is the first serious attempt to create a comprehensive reference for all game AI practices, terminology, and know-how. Works like this are badly needed by the maturing video games industry. Systematic yet accessible, it is a must-have for any student or professional." -Marcin Chady, Ph.D., Radical Entertainment

...
Web Services Security and E-business
Web Services Security and E-business
Many techniques, algorithms, protocols, and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality, and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols,...
E-collaboration in Modern Organizations: Initiating and Managing Distributed Projects (Premier Reference Source)
E-collaboration in Modern Organizations: Initiating and Managing Distributed Projects (Premier Reference Source)
E-Collaboration in Modern Organizations: Initiating and Managing Distributed Project combines comprehensive research related to e-collaboration in modern organizations, emphasizing topics relevant to those involved in initiating and managing distributed projects. Providing authoritative content to scholars, researchers, and...
A Matrix Handbook for Statisticians (Wiley Series in Probability and Statistics)
A Matrix Handbook for Statisticians (Wiley Series in Probability and Statistics)
A comprehensive, must-have handbook of matrix methods with a unique emphasis on statistical applications

This timely book, A Matrix Handbook for Statisticians, provides a comprehensive, encyclopedic treatment of matrices as they relate to both statistical concepts and methodologies. Written by an experienced authority on matrices and...

Trustworthy Computing: Analytical and Quantitative Engineering Evaluation
Trustworthy Computing: Analytical and Quantitative Engineering Evaluation
"The book itself is a commendable achievement, and it deals with the security and software reliability theory in an integrated fashion with emphasis on practical applications to software engineering and information technology. It is an excellent and unique book and definitely a seminal contribution and first of its kind."

...

Wiley Encyclopedia of Telecommunications , 5 Volume Set
Wiley Encyclopedia of Telecommunications , 5 Volume Set
"...contains a wealth of information treating all aspects of telecommunications...an excellent reference source...recommended." (Choice, Vol. 41, No. 1, September 2003)

Engineers have long required a comprehensive yet concise resource to turn to for reliable, up-to-date information on the continually
...
Building the Knowledge Society on the Internet: Sharing and Exchanging Knowledge in Networked Environments
Building the Knowledge Society on the Internet: Sharing and Exchanging Knowledge in Networked Environments
In today's networked societies, a key factor of the social and economic success is the capability to exchange, transfer, and share knowledge. In the wide-ranging area of knowledge management, the issue of knowledge exchange in networked environments emerges in several application fields, and is treated with different approaches....
Microprocessor Theory and Applications with 68000/68020 and Pentium
Microprocessor Theory and Applications with 68000/68020 and Pentium
A self-contained introduction to microprocessor theory and applications

This book presents the fundamental concepts of assembly language programming and system design associated with typical microprocessors, such as the Motorola MC68000/68020 and Intel® Pentium®. It begins with an overview of microprocessors—including...

A Basic Guide for Valuing a Company, 2nd Edition
A Basic Guide for Valuing a Company, 2nd Edition
The Groundwork of Company Valuation for First-time Buyers and Sellers

A Basic Guide for Valuing a Company has helped thousands of first-time buyers and sellers realize a fair, substantiated value for small businesses. Now in its Second Edition, this book covers common valuation techniques and myths, tips for determining tangible and intangible...

Result Page: 58 57 56 55 54 53 52 51 50 49 48 47 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy