Home | Amazing | Today | Tags | Publishers | Years | Search 
Crime Scene Photography, Second Edition
Crime Scene Photography, Second Edition

This textbook is designed for two principal photography student types. One group is the student in an academic setting. Students are expected to acquire a solid grasp of the theories and concepts of their various courses. This is the Knowledge point of the “KSAs” frequently required by employers. Students in an academic...

Nanometer CMOS RFICs for Mobile TV Applications (Analog Circuits and Signal Processing)
Nanometer CMOS RFICs for Mobile TV Applications (Analog Circuits and Signal Processing)

People often ask me why I chose to publish this work. Primarily, this book was motivated by my experience in industry after having been in the academic world for many years. We often hear about the need to bridge the gap between industry and academia, but one can easily intellectually understand something without having experienced it...

Word Processing in Groups
Word Processing in Groups

Connections between the theory of hyperbolic manifolds and the theory of automata are deeply interwoven in the history of mathematics of this century.

The use of symbol sequences to study dynamical systems originates in the work of Kocbe [Koc27, Koe29] and Morse [Mor87j, who both used symbol saliences to code geodesies on a...

Synchronization of Parallel Programmes (Studies in computer science)
Synchronization of Parallel Programmes (Studies in computer science)

The use of modular and parallel programming languages, and the development of distributed architectures is having a profound influence on computer programming and systems design; hardware and performance can now conspire to produce much higher operating speeds than could previously be achieved through sequential processing. Executing...

Introduction to Embedded Systems: Interfacing to the Freescale 9S12
Introduction to Embedded Systems: Interfacing to the Freescale 9S12

Embedded computer systems are electronic systems that include a microcomputer to perform specific dedicated tasks. The computer is hidden inside these products. Embedded systems are ubiquitous. Every week millions of tiny computer chips come pouring out of factories like Freescale, Microchip, Philips, Texas Instruments, Silicon Labs,...

Machine Learning and Statistical Modeling Approaches to Image Retrieval (The Information Retrieval Series)
Machine Learning and Statistical Modeling Approaches to Image Retrieval (The Information Retrieval Series)

In the early 1990s, the establishment of the Internet brought forth a revolutionary viewpoint of information storage, distribution, and processing: the World-Wide Web is becoming an enormous and expanding distributed digital library. Along with the development of the Web, image indexing and retrieval have grown into research areas...

Information Technology Auditing (with ACL CD-ROM)
Information Technology Auditing (with ACL CD-ROM)

The third edition of this text contains key improvements and changes that continue to provide instructors and students with the best information technology auditing text available. This edition has been reorganized and expanded to address the internal control and audit issues mandated by Sarbanes-Oxley legislation. The third edition...

Knowledge Discovery from Data Streams (Chapman & Hall/CRC Data Mining and Knowledge Discovery Series)
Knowledge Discovery from Data Streams (Chapman & Hall/CRC Data Mining and Knowledge Discovery Series)

In the last three decades, machine learning research and practice have focused on batch learning usually using small datasets. In batch learning, the whole training data is available to the algorithm, which outputs a decision model after processing the data eventually (or most of the times) multiple times. The rationale behind this...

The Nested Universal Relation Database Model (Lecture Notes in Computer Science)
The Nested Universal Relation Database Model (Lecture Notes in Computer Science)

During the 1980's the flat relational model (relational model), which was initiated by Codd in 1970, gained immense popularity and acceptance in the market place. One of the main reasons for this success is that the relational model provides physical data independences i.e. changing the physical organization of the database does not...

Simulated Annealing and Boltzmann Machines: A Stochastic Approach to Combinatorial Optimization and Neural Computing
Simulated Annealing and Boltzmann Machines: A Stochastic Approach to Combinatorial Optimization and Neural Computing

Wiley-Interscience Series in Discrete Mathematics and Optimization Advisory Editors Ronald L. Graham Jan Karel Lenstra Robert E. Tarjan Discrete Mathematics and Optimization involves the study of finite structures. It is one of the fastest growing areas in mathematics today. The level and depth of recent advances in the area and the wide...

Dedicated Digital Processors: Methods in Hardware/Software Co-Design
Dedicated Digital Processors: Methods in Hardware/Software Co-Design

This book is intended as an introduction to the design of digital processors that are dedicated to performing a particular task. It presents a number of general methods and also covers general purpose architectures such as programmable processors and configurable logic. In fact, the dedicated digital system might be based on a standard...

Security in Ad-hoc and Sensor Networks (Computer and Network Security)
Security in Ad-hoc and Sensor Networks (Computer and Network Security)

Ad hoc and sensor networks continue to have a growing impact on communication. These cost-effective wireless networks provide location independent computing in environments ranging from military battlefields to in-home patient monitoring systems. However, having real-time connectivity to critical information over an open...

Result Page: 235 234 233 232 231 230 229 228 227 226 225 224 223 222 221 220 219 218 217 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy