Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Logistics and Retail Management: Insights into Current Practice and Trends from Leading Experts
Logistics and Retail Management: Insights into Current Practice and Trends from Leading Experts

Throughout the last decade there have been steady, incremental improvements and relationship changes in retail logistics. These changes have been fundamental to business efficiency and it is now widely recognized that logistics excellence provides competitive advantage. Emphasis is now on minimizing time to market, maximizing on-shelf...

Reasoning in Event-Based Distributed Systems (Studies in Computational Intelligence)
Reasoning in Event-Based Distributed Systems (Studies in Computational Intelligence)

Event-based distributed systems are playing an ever increasing role in areas such as enterprise management, information dissemination, finance, environmental monitoring and geo-spatial systems. Event-based processing originated with the introduction of Event-Condition-Action (ECA) rules to database systems in the 1980s. Since then,...

Lattice-Based Public-Key Cryptography in Hardware (Computer Architecture and Design Methodologies)
Lattice-Based Public-Key Cryptography in Hardware (Computer Architecture and Design Methodologies)
This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post...
Everyware: The Dawning Age of Ubiquitous Computing
Everyware: The Dawning Age of Ubiquitous Computing
From the RFID tags now embedded in everything from soda cans to the family pet, to smart buildings that subtly adapt to the changing flow of visitors, to gestural interfaces like the ones seen in Minority Report, computing no longer looks much like it used to. Increasingly invisible but present everywhere in our lives, it has moved off the desktop...
Encyclopedia of Mobile Computing and Commerce
Encyclopedia of Mobile Computing and Commerce
Nowadays, mobile communication, mobile devices, and mobile computing are widely available. Everywhere people are carrying mobile devices, such as mobile phones. The availability of mobile communication networks has made a huge impact to various applications, including commerce. Consequently, there is a strong relationship between mobile computing...
RF Circuit Design Techniques for MF-UHF Applications
RF Circuit Design Techniques for MF-UHF Applications

Magnetic resonance imaging, semiconductor processing, and RFID are some of the critical applications within the medium frequency (MF) to ultrahigh frequency (UHF) range that require RF designers to have a solid understanding of analytical and experimental RF techniques. Designers need to be able to design components and devices cost...

Digital Convergence - Libraries of the Future
Digital Convergence - Libraries of the Future
Clay tablets have been used to keep records from the earliest times. However, they were used for archives rather than libraries and consisted mainly of administrative records.Private and personal libraries containing books first appeared in Greece in the 5th century BC.The Royal Library of Alexandria was founded in the 3rd century BC and was...
Arduino and LEGO Projects
Arduino and LEGO Projects

We all know how awesome LEGO is, and more and more people are discovering how many amazing things you can do with Arduino. In Arduino and LEGO Projects, Jon Lazar shows you how to combine two of the coolest things on the planet to make fun gadgets like a Magic Lantern RF reader, a sensor-enabled LEGO music box, and even an...

RFID-A Guide to Radio Frequency Identification
RFID-A Guide to Radio Frequency Identification
This book provides an introduction to RFID technology. It describes and addresses the following: How RFID works, how it is and can be used in current and future applications. The History of RFID technology, the current state of practice and where RFID is expected to be taken in the future. The role of middleware software to route data between the...
Pro ASP.NET Web API Security: Securing ASP.NET Web API
Pro ASP.NET Web API Security: Securing ASP.NET Web API

ASP.NET Web API is a key part of ASP.NET MVC 4 and the platform of choice for building RESTful services that can be accessed by a wide range of devices. Everything from JavaScript libraries to RIA plugins, RFID readers to smart phones can consume your services using platform-agnostic HTTP.

With such wide accessibility,
...

Handbook of Enterprise Integration
Handbook of Enterprise Integration

Maintaining compatibility among all affected network and application interfaces of modern enterprise systems can quickly become costly and overwhelming. This handbook presents the knowledge and practical experience of a global group of experts from varying disciplines to help you plan and implement enterprise integration projects that respond...

RFID Security
RFID Security

RFID (Radio Frequency Identification) is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that allow them to receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ passes to dogs to...

Result Page: 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy