Home | Amazing | Today | Tags | Publishers | Years | Search 
EJB 3.1 Cookbook
EJB 3.1 Cookbook

Enterprise Java Beans enable rapid and simplified development of secure and portable applications based on Java technology. Creating and using EJBs can be challenging and rewarding. Among the challenges are learning the EJB technology itself, learning how to use the development environment you have chosen for EJB development, and the testing...

Virtualization: A Manager's Guide
Virtualization: A Manager's Guide

This book is intended to introduce managers or subject matter experts outside of information technology (IT) to the concepts behind virtualization technology, the different categories of virtualization, and how they are used. It is not meant to replace product documentation. It is not meant as a “how to” guide...

Security in Ad-hoc and Sensor Networks (Computer and Network Security)
Security in Ad-hoc and Sensor Networks (Computer and Network Security)

Ad hoc and sensor networks continue to have a growing impact on communication. These cost-effective wireless networks provide location independent computing in environments ranging from military battlefields to in-home patient monitoring systems. However, having real-time connectivity to critical information over an open...

Simulated Annealing and Boltzmann Machines: A Stochastic Approach to Combinatorial Optimization and Neural Computing
Simulated Annealing and Boltzmann Machines: A Stochastic Approach to Combinatorial Optimization and Neural Computing

Wiley-Interscience Series in Discrete Mathematics and Optimization Advisory Editors Ronald L. Graham Jan Karel Lenstra Robert E. Tarjan Discrete Mathematics and Optimization involves the study of finite structures. It is one of the fastest growing areas in mathematics today. The level and depth of recent advances in the area and the wide...

Dedicated Digital Processors: Methods in Hardware/Software Co-Design
Dedicated Digital Processors: Methods in Hardware/Software Co-Design

This book is intended as an introduction to the design of digital processors that are dedicated to performing a particular task. It presents a number of general methods and also covers general purpose architectures such as programmable processors and configurable logic. In fact, the dedicated digital system might be based on a standard...

The Nested Universal Relation Database Model (Lecture Notes in Computer Science)
The Nested Universal Relation Database Model (Lecture Notes in Computer Science)

During the 1980's the flat relational model (relational model), which was initiated by Codd in 1970, gained immense popularity and acceptance in the market place. One of the main reasons for this success is that the relational model provides physical data independences i.e. changing the physical organization of the database does not...

Group Theoretical Methods in Image Processing (Lecture Notes in Computer Science)
Group Theoretical Methods in Image Processing (Lecture Notes in Computer Science)

These Lecture Notes are based on a series of lectures I gave at the Linkoping University Department of Electrical Engineering in 1988. In these lectures 1 tried to give an overview of the theory of representation of compact groups and some applications in the fields of image science and pattern recognition.

The participants...

Scalable Network Monitoring in High Speed Networks
Scalable Network Monitoring in High Speed Networks

Network monitoring serves as basis for a wide scope of network operations, engineering and management. Precise network monitoring involves inspecting every packet traversing in a network. However, this is infeasible in today’s and future high-speed networks, due to significant overheads of processing, storing, and transferring...

Advanced Database Query Systems: Techniques, Applications and Technologies (Premier Reference Source)
Advanced Database Query Systems: Techniques, Applications and Technologies (Premier Reference Source)

Databases are designed to support data storage, processing, and retrieval activities related to data management. The use of databases in various applications has resulted in an enormous wealth of data, which populates many types of databases around the world.

Advanced Database Query Systems: Techniques, Applications and...

The AWK Programming Language
The AWK Programming Language

Computer users spend a lot of time doing simple, mechanical data manipulation - changing the format of data, checking its validity, finding items with some property, adding up numbers, printing reports, and the like. All of these jobs ought to be mechanized, but it's a real nuisance to have to write a specialpurpose program in a...

Multimodal Usability (Human-Computer Interaction Series)
Multimodal Usability (Human-Computer Interaction Series)

This preface tells the story of how Multimodal Usability responds to a special challenge. Chapter 1 describes the goals and structure of this book.

The idea of describing how to make multimodal computer systems usable arose in the European Network of Excellence SIMILAR – “Taskforce for creating human-machine...

The Architecture of Computer Hardware, Systems Software, & Networking: An Information Technology Approach
The Architecture of Computer Hardware, Systems Software, & Networking: An Information Technology Approach

The modern world offers lots of readily available online resources for learning. Wikipedia, Google, news sources, millions of Web sites and blogs, even YouTube, offer access to information in nearly any subject that triggers your curiosity and interest. Nonetheless, I continue to believe that for deep understanding of something, nothing...

Result Page: 234 233 232 231 230 229 228 227 226 225 224 223 222 221 220 219 218 217 216 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy