Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Coping with Interference in Wireless Networks (Signals and Communication Technology)
Coping with Interference in Wireless Networks (Signals and Communication Technology)

Unlike wired networks where transmitters have no effect on receivers other than their own, in wireless networks we are limited by interference. The traditional routing methods are not optimal any more when it comes to a wireless medium. The maximum data rate on each link depends not only on the power in that link but also on the transmitted...

Markov Random Field Modeling in Image Analysis (Advances in Pattern Recognition)
Markov Random Field Modeling in Image Analysis (Advances in Pattern Recognition)

Modeling problems in this book are addressed mainly from the computational viewpoint. The primary concerns are how to define an objective function for the optimal solution to a image analysis or computer vision problem and how to find the optimal solution. The solution is defined in an optimization sense because the perfect solution is...

Objects, Abstraction, Data Structures and Design: Using C++
Objects, Abstraction, Data Structures and Design: Using C++
Our goal in writing this book was to combine a strong emphasis on problem solving and software design with the study of data structures. To this end, we discuss applications of each data structure to motivate its study. After providing the specification (a header file) and the implementation of an abstract data type, we cover case...
Beginning Perl
Beginning Perl
That was the subtitle for this book that was sadly, but wisely, rejected. However, it conveys two things about this book that I’ve tried to focus on: getting a job and having fun while learning the skills you need. Well, as much fun as you can reasonably have while learning how to program. Although many books aren’t...
Principles of Data Integration
Principles of Data Integration

How do you approach answering queries when your data is stored in multiple databases that were designed independently by different people? This is first comprehensive book on data integration and is written by three of the most respected experts in the field.

This book provides an extensive introduction to the theory and concepts...

Practical Salesforce.com Development Without Code: Customizing Salesforce on the Force.com Platform
Practical Salesforce.com Development Without Code: Customizing Salesforce on the Force.com Platform

Are you facing a challenging Salesforce.com problem--say, relating to automation, configuration, formulation, or reporting--that you can't quite crack? Or maybe you are hoping to infuse some creativity into your solution design strategy to solve problems faster or make solutions more efficient? Practical Salesforce.com Development...

Cornea and External Eye Disease: Corneal Allotransplantation, Allergic Disease and Trachoma (Essentials in Ophthalmology)
Cornea and External Eye Disease: Corneal Allotransplantation, Allergic Disease and Trachoma (Essentials in Ophthalmology)
The second volume covers a broad range of conjunctival and corneal diseases, again with particular emphasis being placed on problem management.

Various new surgical approaches are currently being evaluated in the clinical setting, an example of which is posterior lamellar keratoplasty in Fuchs endothelial
...
Learn Keras for Deep Neural Networks: A Fast-Track Approach to Modern Deep Learning with Python
Learn Keras for Deep Neural Networks: A Fast-Track Approach to Modern Deep Learning with Python

Learn, understand, and implement deep neural networks in a math- and programming-friendly approach using Keras and Python. The book focuses on an end-to-end approach to developing supervised learning algorithms in regression and classification with practical business-centric use-cases implemented in Keras.

The overall...

Peer-to-Peer : Harnessing the Power of Disruptive Technologies
Peer-to-Peer : Harnessing the Power of Disruptive Technologies

The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and...

Combating Piracy: Intellectual Property Theft and Fraud
Combating Piracy: Intellectual Property Theft and Fraud
Manifestations of fraud in the early twenty-first century are showing signs of innovations and adaptation in response to shifting opportunities. This book reports on new analyses of intellectual property theft as its most recent expression. Fraud and piracy of products and ideas have become common as the opportunities to commit them expand, and...
Programming INDIGO
Programming INDIGO

Microsoft Code Name “Indigo” is an advanced infrastructure and programming model for creating connected applications. It's like nothing that has come before. That's a bold statement, so allow me to put it in perspective for you.

I wrote my first communication program over 20 years ago and...

Model-Based Development: Applications
Model-Based Development: Applications

A Proven Development Methodology That Delivers On the Promise of Model-Based Approaches

Software continues to become more and more complex, while software consumers’ expectations for performance, reliability, functionality, and speed-to-market are also growing exponentially. H. S. Lahman shows how...

unlimited object storage image
Result Page: 253 252 251 250 249 248 247 246 245 244 243 242 241 240 239 238 237 236 235 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy