Home | Amazing | Today | Tags | Publishers | Years | Search 
Introduction to Embedded Systems: Interfacing to the Freescale 9S12
Introduction to Embedded Systems: Interfacing to the Freescale 9S12

Embedded computer systems are electronic systems that include a microcomputer to perform specific dedicated tasks. The computer is hidden inside these products. Embedded systems are ubiquitous. Every week millions of tiny computer chips come pouring out of factories like Freescale, Microchip, Philips, Texas Instruments, Silicon Labs,...

Theory and Applications of Models of Computation: Third International Conference, TAMC 2006, Beijing, China
Theory and Applications of Models of Computation: Third International Conference, TAMC 2006, Beijing, China

In several practical circumstances we have to solve a problem whose instance is not a priori completely known. Situations of this kind occur in computer systems and networks management, in financial decision making, in robotics etc. Problems that have to be solved without a complete knowledge of the instance are called on-line...

Document Security: Protecting Physical and Electronic Content
Document Security: Protecting Physical and Electronic Content

Several electronic layers exist in most documents, a fact overlooked by many writers. Probing these sublayers often reveals information not intended for release by the author. Documents in electronic formats create a “palimpsest” that even semiskilled investigators can probe for sensitive data.

Palimpsest seems...

Hacking the Human
Hacking the Human

Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on systems and attackers are rarely required to find technical vulnerabilities, hacking the human is usually sufficient.Ian Mann turns the black art of...

Neural Fuzzy Systems: A Neuro-Fuzzy Synergism to Intelligent Systems
Neural Fuzzy Systems: A Neuro-Fuzzy Synergism to Intelligent Systems

Fuzzy systems and neural networks have attracted the growing interest of researchers, scientists, engineers, practitioners, and students in various scientific and engineering areas. Fuzzy sets and fuzzy logic are based on the way the brain deals with inexact information, while neural networks (or artificial neural networks) are modeled...

Qualitative Representation of Spatial Knowledge (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)
Qualitative Representation of Spatial Knowledge (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)

Cognitive spatial concepts are qualitative in nature, i.e., they are based not so much on exact quantities but on comparisons between perceived magnitudes. We develop a qualitative model for the representation of spatial knowledge (in particular, of positional information about 2-dimensional projections) that is based only on locative...

ALGORITHMS FOR LINEAR-QUADRATIC OPTIMIZATION
ALGORITHMS FOR LINEAR-QUADRATIC OPTIMIZATION

Linear-quadratic optimization is one of the most exciting topics in the con trol engineering literature of recent decades. The interest in linear optimal dynamical systems, and especially in those with quadratic cost functional, can be explained by both the richness of properties these systems possess, and the pragmatic value and physical...

Principles of Communications Networks and Systems
Principles of Communications Networks and Systems

This book addresses the fundamentals of communications systems and networks, providing models and analytical methods for evaluating their performance. It is divided into ten chapters, which are the result of a joint effort by the authors and contributors. The authors and the contributors have a long history of collaboration, both in...

Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems (Signals and Communication Technology)
Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems (Signals and Communication Technology)

From time immemorial, the security realm and personal identification task had shown progress by employing technological means like secret knowledge as passwords and Personal Identification Numbers, and by using personal possessions as identity cards and Radio Frequency Identification chips. As opposed to these means which are...

Internet and Network Economics: 7th International Workshop, WINE 2011, Singapore, December 11-14, 2011
Internet and Network Economics: 7th International Workshop, WINE 2011, Singapore, December 11-14, 2011

This volume contains the papers presented at WINE 2011: 7th Workshop on Internet and Network Economics held during December 11–14, 2011 in Singapore.

Over the past decade, there has been a growing interaction between researchers in theoretical computer science, networking and security, economics, mathematics, sociology,...

Advanced Artificial Intelligence (Series on Intelligence Science)
Advanced Artificial Intelligence (Series on Intelligence Science)

Artificial Intelligence's long-term goal is to build the human level of artificial intelligence. AI was born 50 years ago, in the bumpy road has made encouraging progress, in particular, machine learning, data mining, computer vision, expert systems, natural language processing, planning, robotics and related applications have...

Pro Windows Phone App Development (Professional Apress)
Pro Windows Phone App Development (Professional Apress)
Windows Phone, updated in Windows Phone 7.5, presents an exciting opportunity for developers to build and monetize mobile applications. It represents a major new investment into mobile computing by Microsoft, and in many ways is a major break from the past. To build applications for Windows Phone, it is important to understand its...
Result Page: 150 149 148 147 146 145 144 143 142 141 140 139 138 137 136 135 134 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy