Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wireless Quality of Service: Techniques, Standards, and Applications (Wireless Networks and Mobile Communications)
Wireless Quality of Service: Techniques, Standards, and Applications (Wireless Networks and Mobile Communications)
Focusing on an important and complicated topic in wireless network design, Wireless Quality of Service: Techniques, Standards, and Applications systematically addresses the quality-of-service (QoS) issues found in many types of popular wireless networks.

In each chapter, the book presents numerous QoS challenges encountered in...

Thrombolytic Therapy for Stroke
Thrombolytic Therapy for Stroke

The world's leading experts detail the basic rationale, scientific evidence, and treatment protocol for thrombolytic therapy in acute stroke patients. These experienced clinicians show how promptly delivered thrombolysis can restore cerebral blood flow in time to salvage brain and neurologic functions, first by reviewing the preclinical...

Java Network Programming, Third Edition
Java Network Programming, Third Edition

Java's growth over the last 10 years has been nothing short of phenomenal. Given Java's rapid rise to prominence and the even more spectacular growth of the Internet, it's a little surprising that network programming in Java is still so mysterious to so many. It doesn't have to be. In fact, writing network programs in Java...

Next Generation Wireless Systems and Networks
Next Generation Wireless Systems and Networks
Next Generation Wireless Systems and Networks offers an expert view of cutting edge Beyond 3rd Generation (B3G) wireless applications. This self-contained reference combines the basics of wireless communications, such as 3G wireless standards, spread spectrum and CDMA systems, with a more advanced level research-oriented...
Advances in Computer-Supported Learning
Advances in Computer-Supported Learning
The Internet and growth of computer networks have eliminated geographic barriers, creating an environment where education can be brought to a student no matter where that student may be. The success of distance learning programs and the availability of many Web-supported applications and multimedia resources have increased the effectiveness of...
Computer Networks (5th Edition)
Computer Networks (5th Edition)

This book is now in its fifth edition. Each edition has corresponded to a different phase in the way computer networks were used. When the first edition appeared in 1980, networks were an academic curiosity. When the second edition appeared in 1988, networks were used by universities and large businesses. When the third edition appeared in...

RNA and DNA Editing: Methods and Protocols (Methods in Molecular Biology)
RNA and DNA Editing: Methods and Protocols (Methods in Molecular Biology)

The recent expansion in diversity of RNA and DNA editing types has stimulated the development of many unique genetic, molecular, biochemical, and computational approaches to biological issues.  In RNA and DNA Editing: Methods and Protocols, leading experts in the field introduce methods developed over the last few years to study...

Linux Kernel Networking: Implementation and Theory (Expert's Voice in Open Source)
Linux Kernel Networking: Implementation and Theory (Expert's Voice in Open Source)

Linux Kernel Networking takes you on a guided in-depth tour of the current Linux networking implementation and the theory behind it. Linux kernel networking is a complex topic, so the book won't burden you with topics not directly related to networking. This book will also not overload you with cumbersome line-by-line code...

Cloud Capacity Management (Expert's Voice in Information Technology)
Cloud Capacity Management (Expert's Voice in Information Technology)

Cloud Capacity Management helps readers in understanding what the cloud, IaaS, PaaS, SaaS are, how they relate to capacity planning and management  and which stakeholders are involved in delivering value in the cloud value chain. It explains the role of capacity management for a creator, aggregator, and consumer of cloud...

Advanced Methods in Cellular Immunology
Advanced Methods in Cellular Immunology

Immunologists as well investigators in other disciplines may often use protocols involving the isolation, cultures and characterization of different types of leukocytes. Advanced Methods in Cellular Immunology is a collection of techniques in an easy-to-use format.

Each chapter provides readers with related program information, a...

Integration of ICT in Smart Organizations
Integration of ICT in Smart Organizations
The production and service of the 21st century is based on distributed or networked organizations. The denomination of these organizations can be different (extended-, virtual-, smart-organization, etc.), but there are some main important common characteristics. In this type of organizations, flexible, independent organizational and production...
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Communication between people has changed with the invention of the telephone. The ability to communicate across continents in real-time has also helped our society in several dimensions including entertainment, trade, finance, and defense. But this new capability did not come without an investment. Building an international telephony...

unlimited object storage image
Result Page: 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy