Home | Amazing | Today | Tags | Publishers | Years | Search 
HCI Models, Theories, and Frameworks: Toward a Multidisciplinary Science (Interactive Technologies)
HCI Models, Theories, and Frameworks: Toward a Multidisciplinary Science (Interactive Technologies)
In the field of human-computer interaction (HCI), researchers and practitioners from diverse disciplines in the social sciences, information technology, engineering, and computer science all strive to improve the relationship, or interface, between person and machine. The multidisciplinary tradition of HCI certainly has enriched its development....
Problems & Solutions In Scientific Computing With C++ And Java Simulations
Problems & Solutions In Scientific Computing With C++ And Java Simulations
Scientific computing is a collection of tools, techniques and theories required to develop and solve mathematical models in science and engineering on a computer. The purpose of this book is to supply a collection of problems together with their detailed solution which will prove to be valuable to students as well as to research workers in the...
Rough Computing: Theories, Technologies and Applications
Rough Computing: Theories, Technologies and Applications
Rough set theory is a new soft computing tool which deals with vagueness and uncertainty. It has attracted the attention of researchers and practitioners worldwide, and has been successfully applied to many fields such as knowledge discovery, decision support, pattern recognition, and machine learning.

Rough Computing: Theories,...

An Executive's Guide to Information Technology: Principles, Business Models, and Terminology
An Executive's Guide to Information Technology: Principles, Business Models, and Terminology
Assessing the most valuable technology for an organization is becoming a growing challenge for business professionals confronted with an expanding array of options. This book is an A-Z compendium of technological terms written for the non-technical executive, allowing quick identification of what the term is and why it is significant. This is more...
Advances in Wireless Communications (The Springer International Series in Engineering and Computer Science)
Advances in Wireless Communications (The Springer International Series in Engineering and Computer Science)
Advances in Wireless Communications covers a broad range of topics in the field of wireless communications, with chapters describing state-of-the-art solutions along with basic theoretical studies in information and communications theory. Thus, the book offers a far-reaching panorama of this exciting field.
Contributions have
...
The Definitive Guide to symfony
The Definitive Guide to symfony
Developing a new web application should not mean reinventing the wheel. Thats why a framework is an essential item in your development toolbox. It helps you respect coding standards; write bulletproof, maintainable code; and focus on business rules rather than waste time on repetitive tasks. This book introduces you to symfony, the leading...
Professional Rich Internet Applications: AJAX and Beyond (Programmer to Programmer)
Professional Rich Internet Applications: AJAX and Beyond (Programmer to Programmer)
Now you can provide users with the same rich experience and functionality on the web that they've become accustomed to on the desktop computer. This book will show you how to take AJAX and Ruby on Rails to the next level by combining numerous cutting-edge technologies in order to develop full-fledged web applications. It explores a number of...
The VLSI Handbook, Second Edition (Electrical Engineering Handbook)
The VLSI Handbook, Second Edition (Electrical Engineering Handbook)
We are most gratified to find that the first edition of The VLSI Handbook (2000) was well received and is widely used. Thus, we feel that our original goal of providing in-depth professional-level coverage of VLSI technology was, indeed, worthwhile. Seven years is a short time in terms of development of science and technology; however as this...
IT Auditing: Using Controls to Protect Information Assets
IT Auditing: Using Controls to Protect Information Assets

Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and...

Secure Systems Development with UML
Secure Systems Development with UML
Attacks against computer systems can cause considerable economic or physical damage. High-quality development of security-critical systems is difficult, mainly because of the conflict between development costs and verifiable correctness.

Jürjens presents the UML extension UMLsec for secure systems development. It uses the standard UML...

Wireless OFDM Systems: How to make them work? (Engineering and Computer Science)
Wireless OFDM Systems: How to make them work? (Engineering and Computer Science)
"This book...gives a comprehensive overview of the implementation of OFDM systems. It capitalizes on the large experience of the authors with the implementation of OFDM based WLAN system. For those who study or work on broadband communication in a wireless multipath environment, this book is a useful and easy-to-read reference..." ...
Expert MySQL
Expert MySQL
Since the enormous number of new features made available with MySQL release 5.0, MySQL has been gaining steam as a viable alternative to database behemoths like Oracle and IBM DB2. MySQL users now have the ability to extend MySQL with new SQL commands, optimize query execution, and embed MySQL within low-resource environments like embedded devices...
Result Page: 375 374 373 372 371 370 369 368 367 366 365 364 363 362 361 360 359 358 357 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy