Home | Amazing | Today | Tags | Publishers | Years | Search 
Beginning Java Objects: From Concepts To Code, Second Edition
Beginning Java Objects: From Concepts To Code, Second Edition
Learning to design objects effectively with Java is the goal of Beginning Java Objects: From Concepts to Code, an intensive yet approachable guide to object design, using UML and today's hottest programming language. Plenty of titles dig into the Java language in massive detail, but this one steps back and looks at object design first. The...
Multimedia Security : Steganography and Digital Watermarking Techniques for Protection of Intellectual Property
Multimedia Security : Steganography and Digital Watermarking Techniques for Protection of Intellectual Property
Multimedia security has become a major research topic, yielding numerous academic papers in addition to many watermarking-related companies. In this emerging area, there are many challenging research issues that deserve sustained studying towards an effective and practical system. Multimedia Security: Steganography and Digital Watermarking...
Design Methods for Reactive Systems: Yourdon, Statemate, and the UML
Design Methods for Reactive Systems: Yourdon, Statemate, and the UML
Design Methods for Reactive Systems describes methods and techniques for the design of software systemsparticularly reactive software systems that engage in stimulus-response behavior. Such systems, which include information systems, workflow management systems, systems for e-commerce, production control systems, and embedded...
TCP/IP Lean: Web Servers for Embedded Systems (2nd Edition)
TCP/IP Lean: Web Servers for Embedded Systems (2nd Edition)
Internet programming demystified! This is a hands-on guide to TCP/IP networking that includes platform-independent source code to a simple TCP/IP stack - a lean version that is easier to present and efficient enough to use in embedded applications. Create

Implement an embedded TCP/IP stack that supports a Web server capable of providing
...
Fuzzy Group Theory (Studies in Fuzziness and Soft Computing)
Fuzzy Group Theory (Studies in Fuzziness and Soft Computing)
From the reviews of the first edition:

 

"The purpose of this book is to present an up to date account of fuzzy subgroups of a group, it is the first book dedicated entirely to the rapidly growing field of fuzzy group theory. … The book represents a major contribution to the literature on fuzzy groups. It is...

Introduction to Data Mining and its Applications (Studies in Computational Intelligence)
Introduction to Data Mining and its Applications (Studies in Computational Intelligence)
An enormous proliferation of databases in almost every area of human endeavor has created a great demand for new, powerful tools for turning data into useful, task-oriented knowledge. In the efforts to satisfy this need, researchers have been exploring ideas and methods developed in machine learning, pattern recognition, statistical data analysis,...
Foundations and Advances in Data Mining
Foundations and Advances in Data Mining
With the growing use of information technology and the recent advances in web systems, the amount of data available to users has increased exponentially. Thus, there is a critical need to understand the content of the data. As a result, data-mining has become a popular research topic in recent years for the treatment of the “data rich and...
Computational Intelligence in Fault Diagnosis (Advanced Information and Knowledge Processing)
Computational Intelligence in Fault Diagnosis (Advanced Information and Knowledge Processing)

Presenting the latest developments and research results on fault diagnosis approaches using computational intelligence methodologies, this book opens with a review of the state-of-the-art before focusing on various theoretical aspects of computational intelligence methodologies applied to real-world fault diagnosis problems.

Chapters...

Discrete Mathematics
Discrete Mathematics

Discrete mathematics is quickly becoming one of the most important areas of mathematical research, with applications to cryptography, linear programming, coding theory and the theory of computing. This book is aimed at undergraduate mathematics and computer science students interested in developing a feeling for what mathematics is all about,...

Designing Collaborative Systems: A Practical Guide to Ethnography (Computer Supported Cooperative Work)
Designing Collaborative Systems: A Practical Guide to Ethnography (Computer Supported Cooperative Work)
Designing Collaborative Systems: A Practical Guide to Ethnography introduces a new 'ethnographic' approach that will enable designers to create collaborative and interactive systems, which are employed successfully in real-world settings. This new approach, adapted from the field of social research, considers both the social...
Spoken Multimodal Human-Computer Dialogue in Mobile Environments (Text, Speech and Language Technology)
Spoken Multimodal Human-Computer Dialogue in Mobile Environments (Text, Speech and Language Technology)
The ongoing migration of computing and information access from stationary environments to mobile computing devices for eventual use in mobile environments, such as Personal Digital Assistants (PDAs), tablet PCs, next generation mobile phones, and in-car driver assistance systems, poses critical challenges for natural human-computer interaction....
Microsoft(r) Systems Management Server 2.0 Administrator's Companion
Microsoft(r) Systems Management Server 2.0 Administrator's Companion

Microsoft has traditionally geared its development of Microsoft BackOffice applications toward providing network administrators with tools that can facilitate the functionality and management of their Microsoft Windows NT networks. For example, applications such as Microsoft Exchange 5.5 and Microsoft SQL Server 7.0 provide exceptional mail...

Result Page: 397 396 395 394 393 392 391 390 389 388 387 386 385 384 383 382 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy