Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Sensors: Theory, Algorithms, and Applications (Springer Optimization and Its Applications)
Sensors: Theory, Algorithms, and Applications (Springer Optimization and Its Applications)
In recent years, technological advances have resulted in the rapid development of a new exciting research direction – the interdisciplinary use of sensors for data collection, systems analysis, and monitoring. Application areas include military surveillance, environmental screening, computational neuroscience,...
Theory and Applications of OFDM and CDMA: Wideband Wireless Communications
Theory and Applications of OFDM and CDMA: Wideband Wireless Communications
Theory and Applications of OFDM and CDMA is an ideal foundation textbook for those seeking a sound knowledge of this fast-developing field of wideband communications. The advanced transmission techniques of OFDM, applied in wireless LANs and in digital and video broadcasting, and CDMA, the foundation of 3G mobile communications, have been...
Performance Management: A New Approach for Driving Business Results
Performance Management: A New Approach for Driving Business Results
Performance Management presents an end-to-end practical model of effective performance management that shows how to develop and implement performance management systems that drive results. It goes beyond prescribing typical best practices – instead focusing on what it really takes to implement performance management effectively....
Codes and Ciphers: Julius Caesar, the Enigma, and the Internet
Codes and Ciphers: Julius Caesar, the Enigma, and the Internet
For at least two thousand years there have been people who wanted to
send messages which could only be read by the people for whom they
were intended. When a message is sent by hand, carried from the sender
to the recipient, whether by a slave, as in ancient Greece or Rome, or by
the Post Office today, there is a risk of it
...
Windows XP Media Center Edition 2004 PC for Dummies
Windows XP Media Center Edition 2004 PC for Dummies
Welcome to Windows XP Media Center Edition 2004 PC For Dummies. What a mouthful! But each word is important, nay, critical! This book is about Microsoft’s next generation of operating system, Windows XP. But this is not an ordinary piece of software — Media Center 2004 is Microsoft’s major push to merge the computing and...
RF Microelectronics (Communications Engineering and Emerging Technologies Series)
RF Microelectronics (Communications Engineering and Emerging Technologies Series)
The annual worldwide sales of cellular phones has exceeded $2.5B. With 4.5 million customers, home satellite networks comprise a $2.5B industry. The global positioning system is expected to become a $5B market by the year 2000. In Europe, the sales of equipment and services for mobile communications will reach $30B by 1998. The statistics are...
Wireless Information Networks (Wiley Series in Telecommunications and Signal Processing)
Wireless Information Networks (Wiley Series in Telecommunications and Signal Processing)
Towards location aware mobile ad hoc sensors

A Systems Engineering Approach to Wireless Information Networks

The Second Edition of this internationally respected textbook brings readers fully up to date with the myriad of developments in wireless communications. When first published in 1995, wireless communications was synonymous...

Implementing Software Defined Radio
Implementing Software Defined Radio

Software Defined Radio makes wireless communications easier, more efficient, and more reliable. This book bridges the gap between academic research and practical implementation. When beginning a project, practicing engineers, technical managers, and graduate students can save countless hours by considering the concepts presented in these...

RFID Security
RFID Security

RFID (Radio Frequency Identification) is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that allow them to receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ passes to dogs to...

The Worldwide History of Telecommunications
The Worldwide History of Telecommunications
The first comprehensive history of the Information Age how we got there and where we are going

The exchange of information is essential for both the organization of nature and the social life of mankind. Until recently, communication between people was more or less limited by geographic proximity. Today, thanks to ongoing innovations in...

Windows Vista (Missing Manual)
Windows Vista (Missing Manual)
Windows Vista is Microsoft's most important software release in more than a decade. It offers users an abundance of new and upgraded features that were more than five years in the making: a gorgeous, glass-like visual overhaul; superior searching and organization tools; a multimedia and collaboration suite; and above all, a massive, top-to-bottom...
Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center
Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center

Modern computing is no longer about devices but is all about providing services, a natural progression that both consumers and enterprises are eager to embrace. As it can deliver those services, efficiently and with quality, at compelling price levels, cloud computing is with us to stay. Ubiquitously and quite definitively, cloud...

unlimited object storage image
Result Page: 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy