Home | Amazing | Today | Tags | Publishers | Years | Search 
Grid Resource Management: Towards Virtual and Services Compliant Grid Computing
Grid Resource Management: Towards Virtual and Services Compliant Grid Computing
Grid technology offers the potential for providing secure access to remote services, thereby promoting scientific collaborations in an unprecedented scale. Grid Resource Management: Toward Virtual and Services Compliant Grid Computing presents a comprehensive account of the architectural issues of grid technology, such as security,...
Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers (Embedded Technology)
Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers (Embedded Technology)
Wireless networking is poised to have a massive impact on communications, and the 802.11 standard is to wireless networking what Ethernet is to wired networking. There are already over 50 million devices using the dominant IEEE 802.11 (essentially wireless Ethernet) standard, with astronomical growth predicted over the next 10 years. New...
Biometric System and Data Analysis: Design, Evaluation, and Data Mining
Biometric System and Data Analysis: Design, Evaluation, and Data Mining
Biometric systems are being used in more places and on a larger scale than ever before. As these systems mature, it is vital to ensure the practitioners responsible for development and deployment, have a strong understanding of the fundamentals of tuning biometric systems.  The focus of biometric research over the past four decades has...
Learning OpenCV: Computer Vision with the OpenCV Library
Learning OpenCV: Computer Vision with the OpenCV Library
Learning OpenCV puts you right in the middle of the rapidly expanding field of computer vision. Written by the creators of OpenCV, the widely used free open-source library, this book introduces you to computer vision and demonstrates how you can quickly build applications that enable computers to "see" and make decisions based on the...
EW 102: A Second Course in Electronic Warfare
EW 102: A Second Course in Electronic Warfare
Serving as a continuation of the bestselling book EW 101: A First Course in Electronic Warfare, this new volume is a second installment of popular tutorials featured in the Journal of Electronic Defense. Without delving into complex mathematics, this book gives engineers, defense contractors, managers, and government procurers a basic working...
Service Orient or Be Doomed!: How Service Orientation Will Change Your Business
Service Orient or Be Doomed!: How Service Orientation Will Change Your Business
Introducing service orientation as a vision and philosophy that can impact a business, this innovative new book equips the reader to:
  • Best use technology resources to meet goals
  • Unleash their "inner nerd" to embrace IT as part of their business as a whole
  • Address the "mother of all business...
Handbook of Computer Crime Investigation: Forensic Tools & Technology
Handbook of Computer Crime Investigation: Forensic Tools & Technology
Computers can be used in virtually any type of crime, ranging from cyberstalking and child pornography to financial fraud, espionage and terrorism. The Handbook of Computer crime investigation presents detailed technical information that can be used to help solve these crimes.

Following on the success of his introductory text, Digital
...
Network Design: Principles and Applications
Network Design: Principles and Applications
NETWORK DESIGN IS A COMPLEX PROCESS, requiring knowledge of several disciplines to include engineering, financial analysis, and computer science. Although the network design process was never simple, advances in technology and the introduction of new networking communications facilities and products resulted in a difficult endeavor becoming more...
RF Photonic Technology in Optical Fiber Links
RF Photonic Technology in Optical Fiber Links
RF photonic components, transmission systems, and signal processing examples in optical fibers are reviewed by leading academic, government, and industry scientists working in this field. This volume introduces various related technologies such as direct modulation of laser sources, external modulation techniques, and detectors. The text is aimed...
The Verilog PLI Handbook: A User's Guide  and Comprehensive Reference on the Verilog Programming Language Interface
The Verilog PLI Handbook: A User's Guide and Comprehensive Reference on the Verilog Programming Language Interface
The Verilog Programming Language Interface is a powerful feature of the Verilog standard. Through this interface, a Verilog simulator can be customized to perform virtually any engineering task desired, such as adding custom design debug utilities, adding proprietary file read/write utilities, and interfacing bus functional C language models to a...
Handbook of Research on Fuzzy Information Processing in Databases
Handbook of Research on Fuzzy Information Processing in Databases
Information technology is one of the most rapidly changing disciplines, especially with the fuzzy extension. Fuzzy databases have been studied in many works and papers but, in general, these works study some particular area and many works are theoretical works, with very few real applications.

The Handbook of Research on Fuzzy...

Hands-On ZigBee: Implementing 802.15.4 with Microcontrollers (Embedded Technology)
Hands-On ZigBee: Implementing 802.15.4 with Microcontrollers (Embedded Technology)
"I recommend this book to anyone doing 802.15.4 or ZigBee development. It is likely that Eady touches on the platform you are or will be using and it contrasts it well with everything else out there." - William Wong, Electronic Design, August 2007

Since its recent introduction, the ZigBee protocol has created an
...
Result Page: 407 406 405 404 403 402 401 400 399 398 397 396 395 394 393 392 391 390 389 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy