Home | Amazing | Today | Tags | Publishers | Years | Search 
Softswitch : Architecture for VoIP (Professional Telecom)
Softswitch : Architecture for VoIP (Professional Telecom)
SOFTSWITCH DISSECTED

SOFT OR HARD? Hardware switches can cost tens of millions and occupy a city block in real estate. Softswitches are a fraction of the cost and the size of a refrigerator. Bypassing big iron can also make for a more efficient development environment, potentially offering more...

CNET Do-It-Yourself Digital Home Office Projects
CNET Do-It-Yourself Digital Home Office Projects
This book is designed to help you create a tech-savvy home office environment so you can do what you do best: your work. Each of the 24 projects in this book was carefully planned to meet your needs as a home office worker.

The book is organized into parts, with projects in each section ranging in difficulty from easy to advanced. Every
...
Finite Model Theory and Its Applications (Texts in Theoretical Computer Science. An EATCS Series)
Finite Model Theory and Its Applications (Texts in Theoretical Computer Science. An EATCS Series)
This book gives a comprehensive overview of central themes of finite model theory expressive power, descriptive complexity, and zero-one laws together with selected applications relating to database theory and artificial intelligence, especially constraint databases and constraint satisfaction problems. The final chapter provides a concise modern...
Secure Data Management in Decentralized Systems (Advances in Information Security)
Secure Data Management in Decentralized Systems (Advances in Information Security)
The research scope of database security has expanded greatly, due to the rapid development of the global inter-networked infrastructure. Databases are no longer stand-alone systems that are only accessible to internal users of organizations. Instead, allowing selective access from different security domains has become a must for many business...
PBX Systems for IP Telephony
PBX Systems for IP Telephony
The most efficient (and economical) ways to bring enterprise communication systems into the Digital Age are in this guide, written by the foremost analyst in the markret space. In PBX Systems for IP Telephony, Allan Sulkin--consultant and advisor to Avaya, Siemens, Cisco, NEC, Alcatel and other world-class companies--evaluates...
Neural Networks Theory
Neural Networks Theory
"Neural Networks Theory is a major contribution to the neural networks literature. It is a treasure trove that should be mined by the thousands of researchers and practitioners worldwide who have not previously had access to the fruits of Soviet and Russian neural network research. Dr. Galushkin is to be congratulated and thanked for his...
Processing: Creative Coding and Computational Art (Foundation)
Processing: Creative Coding and Computational Art (Foundation)
If you're interested in creating cutting-edge code-based art and animations, you've come to the right place! Processing (available at www.processing.org) is a revolutionary open source programming language and environment designed to bridge the gap between programming and art, allowing non-programmers to learn programming fundamentals as easily as...
Fundamental Data Compression
Fundamental Data Compression
Fundamental Data Compression provides all the information students need to be able to use this essential technology in their future careers. A huge, active research field, and a part of many people's everyday lives, compression technology is an essential part of today's Computer Science and Electronic Engineering courses.
...
Agent-Mediated Electronic Commerce. Automated Negotiation and Strategy Design for Electronic Markets
Agent-Mediated Electronic Commerce. Automated Negotiation and Strategy Design for Electronic Markets
This book constitutes the thoroughly refereed post-proceedings of the joint International Workshops on Trading Agent Design and Analysis, TADA 2006, and on Agent Mediated Electronic Commerce, AMEC VIII 2006, held in Hakodate, Japan, in May 2006 as an associated event of AAMAS 2006, the 5th International Joint Conference on Autonomous Agents and...
AVIEN Malware Defense Guide for the Enterprise
AVIEN Malware Defense Guide for the Enterprise
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected...
Home Theater For Dummies (Computer/Tech)
Home Theater For Dummies (Computer/Tech)

A low-tech way to understand a high-tech system!

Create the home entertainment center that fits your home and your tastes

Gadget fans, a home theater setup is the stuff your dreams are made of. This book keeps the dream from becoming a nightmare! Here's how to select, set up, and optimize a system, translate the salesperson's...

Database Programming Languages: 11th International Symposium, DBPL 2007, Vienna, Austria, September 23-24, 2007
Database Programming Languages: 11th International Symposium, DBPL 2007, Vienna, Austria, September 23-24, 2007
This volume contains the proceedings of the 11th International Symposium on Database Programming Languages (DBPL 2007), held in Vienna, Austria, on September 23–24, 2007. DBPL 2007 was one of 15 meetings co-located with VLDB (the International Conference on Very Large Data Bases).

DBPL continues to present the very best work at the
...
Result Page: 510 509 508 507 506 505 504 503 502 501 500 499 498 497 496 495 494 493 492 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy