Home | Amazing | Today | Tags | Publishers | Years | Search 
Biometric System and Data Analysis: Design, Evaluation, and Data Mining
Biometric System and Data Analysis: Design, Evaluation, and Data Mining
Biometric systems are being used in more places and on a larger scale than ever before. As these systems mature, it is vital to ensure the practitioners responsible for development and deployment, have a strong understanding of the fundamentals of tuning biometric systems.  The focus of biometric research over the past four decades has...
Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers (Embedded Technology)
Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers (Embedded Technology)
Wireless networking is poised to have a massive impact on communications, and the 802.11 standard is to wireless networking what Ethernet is to wired networking. There are already over 50 million devices using the dominant IEEE 802.11 (essentially wireless Ethernet) standard, with astronomical growth predicted over the next 10 years. New...
Grid Resource Management: Towards Virtual and Services Compliant Grid Computing
Grid Resource Management: Towards Virtual and Services Compliant Grid Computing
Grid technology offers the potential for providing secure access to remote services, thereby promoting scientific collaborations in an unprecedented scale. Grid Resource Management: Toward Virtual and Services Compliant Grid Computing presents a comprehensive account of the architectural issues of grid technology, such as security,...
Liquid Crystalline Polymers
Liquid Crystalline Polymers
"Their book is a most useful resource for approaching a large literature that even a specialist needs help to assimilate. -- Professor Mark Warner, Cavendish Laboratory Cambridge, UK

This textbook consists of six chapters. The first chapter highlights the concept of liquid crystals, including chemical structure, phase
...
The Martians of Science: Five Physicists Who Changed the Twentieth Century
The Martians of Science: Five Physicists Who Changed the Twentieth Century
If science has the equivalent of a Bloomsbury group, it is the five men born at the turn of the twentieth century in Budapest: Theodore von Karman, Leo Szilard, Eugene Wigner, John von Neumann, and Edward Teller. From Hungary to Germany to the United States, they remained friends and continued to work together and influence each other throughout...
The Art of Designing Embedded Systems, Second Edition
The Art of Designing Embedded Systems, Second Edition

For tens of thousands of years the human race used their muscles and the labor of animals to build a world that differed little from that known by all their ancestors. But in 1776 James Watt installed the fi rst of his improved steam engines in a commercial enterprise, kicking off the industrial revolution.

The 1800s were
...

The All-New Switch Book: The Complete Guide to LAN Switching Technology
The All-New Switch Book: The Complete Guide to LAN Switching Technology
The much-anticipated update to the bestselling book on LAN switching

Since the publication of the first edition of The Switch Book seven years ago, LAN switching has witnessed significant changes, particularly in the areas of network layers, Ethernet, fast Ethernet, segmenting LANs, layer 3 switching, layer 4 switching, and multi-layer...

Distributed Algorithms (The Morgan Kaufmann Series in Data Management Systems)
Distributed Algorithms (The Morgan Kaufmann Series in Data Management Systems)
In Distributed Algorithms, Nancy Lynch provides a blueprint for designing, implementing, and analyzing distributed algorithms. She directs her book at a wide audience, including students, programmers, system designers, and researchers.

Distributed Algorithms
contains the most significant algorithms and impossibility
...
Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition
Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition
Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state. It simplifies security by providing clear and organized methods and by guiding you to the most effective resources...
3D Shape: Its Unique Place in Visual Perception
3D Shape: Its Unique Place in Visual Perception
The uniqueness of shape as a perceptual property lies in the fact that it is both complex and structured. Shapes are perceived veridically—perceived as they really are in the physical world, regardless of the orientation from which they are viewed. The constancy of the shape percept is the sine qua non of shape perception; you are...
Principles of Transistor Circuits : Introduction to the Design of Amplifiers, Receivers and Digital Circuits
Principles of Transistor Circuits : Introduction to the Design of Amplifiers, Receivers and Digital Circuits

Over the last 40 years, Principles of Transistor Circuits has provided students and practitioners with a text they can rely on to keep them at the forefront of transistor circuit design.

Although integrated circuits have widespread application, the role of discrete transistors both as important building blocks which students
...

Exploring C++: The Programmer's Introduction to C++
Exploring C++: The Programmer's Introduction to C++
Exploring C++ uses a series of self–directed lessons to divide C++ into bite–sized chunks that you can digest as rapidly as you can swallow them. The book assumes only a basic understanding of fundamental programming concepts (variables, functions, expressions, statements) and requires no prior knowledge of C or any other...
Result Page: 406 405 404 403 402 401 400 399 398 397 396 395 394 393 392 391 390 389 388 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy