Home | Amazing | Today | Tags | Publishers | Years | Search 
REST: From Research to Practice
REST: From Research to Practice

Anybody following the discussions around “Web Services” in recent years is aware of the fuzzy definition of the term, and a little bit of history can quite easily explain some of the confusions around current terminology (or use of terminology). The general idea of using Web technologies to not only deliver Web pages (HTML...

Imaging for Detection and Identification (NATO Security through Science Series B: Physics and Biophysics)
Imaging for Detection and Identification (NATO Security through Science Series B: Physics and Biophysics)

The chapters in this volume were presented at the July–August 2006 NATO Advanced Study Institute on Imaging for Detection and Identification. The conference was held at the beautiful Il Ciocco resort near Lucca, in the glorious Tuscany region of northern Italy. For the eighth time we gathered at this idyllic spot to explore and...

An Introduction To The Theory Of Spatial Object Modelling For GIS (Research Monographs in GIS)
An Introduction To The Theory Of Spatial Object Modelling For GIS (Research Monographs in GIS)

In 1983 I left the International Institute for Aerospace Survey and Earth Sciences (ITC) and went to Wageningen Agricultural University, where I took the chair of “Land Surveying and Teledetection”. Up to that time I had been active mainly in geodesy and photogrammetry, but at Wageningen it soon became...

Innovative Tools for Business Coalitions in B2B Applications
Innovative Tools for Business Coalitions in B2B Applications

One of the most debated consequences regarding the increased availability and use of information and communication technologies (ICTs), especially since the early 1990s, have been their impact on economic growth. Generally speaking, ICT can serve to reduce transaction costs at all levels of a commercial transaction. With the emergence...

Demand-Driven Associative Classification (SpringerBriefs in Computer Science)
Demand-Driven Associative Classification (SpringerBriefs in Computer Science)

The ultimate goal of computers is to help humans to solve problems. The solutions for such problems are typically programmed by experts, and the computers need only to follow the specified steps to solve the problem. However, the solution of some problems may be too difficult to be explicitly programmed. In such difficult cases,...

Developing Blackberry Tablet Applications with Flex 4.5
Developing Blackberry Tablet Applications with Flex 4.5

In 2011, Research in Motion (RIM) introduced an entirely new operating system known as the BlackBerry Tablet OS. The first device using this new operating system was released in May of 2011 and was known as the BlackBerry PlayBook. Through Adobe’s partnership with RIM, this new operating system was built fully integrated with...

Fundamentals of Sensor Network Programming: Applications and Technology
Fundamentals of Sensor Network Programming: Applications and Technology

Sensor processing is a central and an important problem in aerospace/defense, automation, medical imaging, and robotics, to name only a few areas. A surveillance system used in aerospace and defense is an example of a sensor processing system. It uses devices such as infrared sensors, microwave radars, and laser radars that are...

Quaternions for Computer Graphics
Quaternions for Computer Graphics

More than 50 years ago when I was studying to become an electrical engineer, I came across complex numbers, which were used to represent out-of-phase voltages and currents using the j operator. I believe that the letter j was used, rather than i, because the latter stood for electrical current. So from the very start of my studies I...

Security Technology: International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference
Security Technology: International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference

We would like to welcome you to the proceedings of the 2009 International Conference on Security Technology (SecTech 2009), which was organized as part of the 2009 International Mega-Conference on Future Generation Information Technology (FGIT 2009), held during December 10–12, 2009, at the International Convention Center Jeju,...

Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry

I am not an expert. I have never claimed to be an expert at anything (at least not seriously done so), least of all an expert in forensic analysis. I am not an expert in Windows Registry analysis. I am simply, by profession, a responder and analyst with some work and research experience in this area. I have also performed a number...

Challenges in Natural Language Processing (Studies in Natural Language Processing)
Challenges in Natural Language Processing (Studies in Natural Language Processing)

Throughout most of the 1960s, 1970s, and 1980s, computational linguistics enjoyed an excellent reputation. A sense of the promise of the work to society was prevalent, and high expectations were justified by solid, steady progress in research.

Nevertheless, by the close of the 1980s, many people openly expressed doubt about...

Nanometer CMOS RFICs for Mobile TV Applications (Analog Circuits and Signal Processing)
Nanometer CMOS RFICs for Mobile TV Applications (Analog Circuits and Signal Processing)

People often ask me why I chose to publish this work. Primarily, this book was motivated by my experience in industry after having been in the academic world for many years. We often hear about the need to bridge the gap between industry and academia, but one can easily intellectually understand something without having experienced it...

Result Page: 568 567 566 565 564 563 562 561 560 559 558 557 556 555 554 553 552 551 550 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy