Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Low-Angle Radar Land Clutter
Low-Angle Radar Land Clutter

A necessary reference for all radar engineers or analysts including many levels of managers, advisors and decision makers in the U.S. and worldwide radar industry. Directly useful in both military (DOD) and civilian (FAA) applications. The result of 20 years of research at MIT Lincoln Lab, this book is of the most significant tehcnological...

Neural Networks and Their Applications
Neural Networks and Their Applications

Neural Networks started as an academic discipline over 50 years ago with the publication by McCulloch and Pitts of their famous result that any logical problem can be solved by a suitable network composed of so-called binary decision nodes. These are processors which make the simplest possible decision, that is, whether or not to respond to a...

Unix in a Nutshell, Fourth Edition
Unix in a Nutshell, Fourth Edition

As an open operating system, Unix can be improved on by anyone and everyone: individuals, companies, universities, and more. As a result, the very nature of Unix has been altered over the years by numerous extensions formulated in an assortment of versions. Today, Unix encompasses everything from Sun's Solaris to Apple's Mac...

Building the Perfect PC
Building the Perfect PC
This popular Build-It-Yourself (BIY) PC book covers everything you want to know about building your own system: Planning and picking out the right components, step-by-step instructions for assembling your perfect PC, and an insightful discussion of why you'd want to do it in the first place. Most big brand computers from HP, Dell and others use...
Sakai CLE Courseware Management: The Official Guide
Sakai CLE Courseware Management: The Official Guide

Open Source software efforts are organized in a variety of different ways. Some of them are driven primarily by a single commercial organization. Others, like Linux, are a result of a diverse contribution of many individuals and organizations and are often led by a "benevolent dictator". The Sakai community fits neither of these...

Acquired Brain Injury: An Integrative Neuro-Rehabilitation Approach
Acquired Brain Injury: An Integrative Neuro-Rehabilitation Approach
Crimmins (2000) marveled at the greatness of the “three pound-blob” that is our brain and control system. As seasoned clinicians in the field of neuro-rehabilitation, we still marvel each day at the resilience of the brain and at the exciting recoveries that we attempt to facilitate in survivors of acquired brain...
Ext.NET Web Application Development
Ext.NET Web Application Development
This book will show how to use Ext.NET 2 to create sophisticated and highly interactive web applications whether you use ASP.NET Web Forms or ASP.NET MVC. The chapters will go through setting up and exploring various controls that Ext.NET provides. It will look at the sophisticated AJAX and data-handling options available while...
Making Crime Television: Producing Entertaining Representations of Crime for Television Broadcast
Making Crime Television: Producing Entertaining Representations of Crime for Television Broadcast

This book employs actor-network theory in order to examine how representations of crime are produced for contemporary prime-time television dramas. As a unique examination of the production of contemporary crime television dramas, particularly their writing process, Making Crime Television: Producing Entertaining Representations of...

Modeling of Complex Systems: Application to Aeronautical Dynamics
Modeling of Complex Systems: Application to Aeronautical Dynamics

In the field of aeronautical dynamics, this book offers readers a design tool which enables them to solve the different problems that can occur during the planning stage of a private project. The authors present a system for the modeling, design and calculation of the flying qualities of airplanes and drones, with a complete mathematical...

Managing the Risks of IT Outsourcing (Computer Weekly Professional)
Managing the Risks of IT Outsourcing (Computer Weekly Professional)
Buyers or suppliers of IT outsourcing services are constantly tormented
by the prospect of having to deal with the vicissitudes of
risks in their projects. In today’s business environment, the
precipitous rates of technological change have outpaced the ability
of many organizations to support the IT function. These
...
Transactional Memory (Synthesis Lectures on Computer Architecture)
Transactional Memory (Synthesis Lectures on Computer Architecture)
The advent of multicore processors has renewed interest in the idea of incorporating transactions into the programming model used to write parallel programs. This approach, known as transactional memory, offers an alternative, and hopefully better, way to coordinate concurrent threads. The ACI (atomicity, consistency, isolation) properties of...
Path-Oriented Program Analysis
Path-Oriented Program Analysis
This book presents a unique method for decomposing a computer program along its execution paths, for simplifying the subprograms so produced, and for recomposing a program from its subprograms. This method enables us to divide and conquer the complexity involved in understanding the computation performed by a program by decomposing it into a set...
unlimited object storage image
Result Page: 103 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy