Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
EDGE for Mobile Internet
EDGE for Mobile Internet
This ground-breaking resource offers you a detailed treatment of EDGE and its critical role in the development of the mobile Internet. The book explains how this global radio based high-speed mobile data standard can be introduced into GSM/GPRS networks, improving data transmission speeds to support multimedia services. It enables you to become...
Communicating Mathematics in the Digital Era
Communicating Mathematics in the Digital Era

The digital era has dramatically changed the ways that researchers search, produce, publish, and disseminate their scientific work. These processes are still rapidly evolving due to improvements in information science, new achievements in computer science technologies, and initiatives such as DML and open access journals, digitization...

Scurvy
Scurvy

In the days of tall ships, one dreaded foe was responsible for more deaths at sea than piracy, shipwreck and all other illnesses combined: Scurvy. Countless mariners suffered an agonizing death, which began with bleeding gums, wobbly teeth, and the opening of old wounds. Surgeon James Lind, Captain James Cook and physician Sir Gilbert Blane...

Reasoning with Probabilistic and Deterministic Graphical Models: Exact Algorithms (Synthesis Lectures on Artificial Intelligence and Machine Learning)
Reasoning with Probabilistic and Deterministic Graphical Models: Exact Algorithms (Synthesis Lectures on Artificial Intelligence and Machine Learning)

Graphical models (e.g., Bayesian and constraint networks, influence diagrams, and Markov decision processes) have become a central paradigm for knowledge representation and reasoning in both artificial intelligence and computer science in general. These models are used to perform many reasoning tasks, such as scheduling, planning and...

Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections
Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections

The current social and economic context increasingly demands open data to improve scientific research and decision making. However, when published data refer to individual respondents, disclosure risk limitation techniques must be implemented to anonymize the data and guarantee by design the fundamental right to privacy of the subjects the...

Advances in Mobile Radio Access Networks
Advances in Mobile Radio Access Networks
This book gives a comprehensive overview of the technologies for the advances of
mobile radio access networks. The topics covered include linear transmitters,
superconducting filters and cryogenic radio frequency (RF) front head, radio over
fiber, software radio base stations, mobile terminal positioning, high speed
downlink
...
Combating Piracy: Intellectual Property Theft and Fraud
Combating Piracy: Intellectual Property Theft and Fraud
Manifestations of fraud in the early twenty-first century are showing signs of innovations and adaptation in response to shifting opportunities. This book reports on new analyses of intellectual property theft as its most recent expression. Fraud and piracy of products and ideas have become common as the opportunities to commit them expand, and...
Jim Blinn's Corner: Notation, Notation, Notation (The Morgan Kaufmann Series in Computer Graphics)
Jim Blinn's Corner: Notation, Notation, Notation (The Morgan Kaufmann Series in Computer Graphics)

The third entry in the Jim Blinn's Corner series, this is, like the others, a handy compilation of selected installments of his influential column. But here, for the first time, you get the "Director's Cut" of the articles: revised, expanded, and enhanced versions of the originals. What's changed? Improved...

Microeconomics
Microeconomics
Where microeconomics gets down to work

Like no other text for the intermediate microeconomics course, Goolsbee, Levitt, and Syverson’s Microeconomics bridges the gap between the theory and practice, providing an empirical dimension that makes the course immediately relevant and useful to students. With carefully crafted...

Women in Ming China (Asian Voices)
Women in Ming China (Asian Voices)

This groundbreaking work provides an original and deeply knowledgeable overview of Chinese women and gender relations during the Ming Dynasty (1368–1644). Bret Hinsch explores in detail the central aspects of female life in this era, including family and marriage, motherhood, political power, work, inheritance, education,...

How to Use Adobe Photoshop CS2
How to Use Adobe Photoshop CS2

Have you ever looked at your color pictures and wished you could make them black and white? Or maybe you've dreamed about taking that photo of your brother, cutting the head off and placing it on the body of a grizzly bear. The tool that you need is Adobe Photoshop and the book you need to learn all about it is ...

UMTS and Mobile Computing
UMTS and Mobile Computing
This unique book bridges the gap between ubiquitous computing (UBICOMP) and third generation mobile communication. A first-of-its-kind, this resource helps you decide which are the most promising technologies to use for specific mobile communication applications. Scenarios indicate how new applications will be developed and how to implement them....
unlimited object storage image
Result Page: 73 72 71 70 69 68 67 66 65 64 63 62 61 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy