 |
|
|
 Matplotlib for Python DevelopersProviding appealing plots and graphs is an essential part of various fields such as scientific research, data analysis, and so on. Matplotlib, the Python 2D plotting library, is used to produce publication-quality figures in a variety of hardcopy formats and interactive environments across platforms. This book explains creating various plots,... |  |  Programming Microsoft Dynamics NAV 2009Microsoft Dynamics NAV is a well established Enterprise Resource Planning (ERP) application, part of the Microsoft Dynamics family. Dynamics NAV is installed worldwide, with well over one million users. Version 2009 contains many major new features and structures, requiring even experienced Dynamics NAV developers to refresh their NAV development... |  |  JBoss RichFaces 3.3JBoss RichFaces is a rich component library for JavaServer Faces and an AJAX framework that allows easy integration of AJAX capabilities into complex business applications. Do you wish to eliminate the time involved in writing JavaScript code and managing JavaScript-compatibility between browsers to build an AJAX web application quickly? ... |
|
 Optimal Design of Queueing SystemsThe First Comprehensive Book on the Subject
Focusing on the underlying structure of a system, Optimal Design of Queueing Systems explores how to set the parameters of a queueing system, such as arrival and service rates, before putting it into operation. It considers various objectives, comparing... |  |  Introduction to Thermoelectricity (Springer Series in Materials Science)Introduction to Thermoelectricity is the latest work by Professor Julian Goldsmid drawing on his 55 years experience in the field. The theory of the thermoelectric and related phenomena is presented in sufficient detail to enable researchers to understand their observations and develop improved thermoelectric materials. The methods for the... |  |  Securing Wireless Communications at the Physical LayerThe book focuses on a recently emerging topic in security. Specifically, the book focuses on physical layer security. Whereas conventional security mechanisms involve cryptography that operates at higher layers of the protocol stack, the methods described in this book secure communications at the physical layer.
The area of physical... |
|
|
Result Page: 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 |