Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Pervasive Information Architecture: Designing Cross-Channel User Experiences
Pervasive Information Architecture: Designing Cross-Channel User Experiences

I knew the Internet before it got famous. There were places but no paths, no maps, no search engines. Entry required a key in the form of an IP address and an incantation in the language of UNIX. It was a small world that felt big because it was so easy to get lost in the shadowy realm of texts and data, completely devoid of color....

Security in Sensor Networks
Security in Sensor Networks

Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities.

Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers,
...

Industrial Sensors and Controls in Communication Networks: From Wired Technologies to Cloud Computing and the Internet of Things (Computer Communications and Networks)
Industrial Sensors and Controls in Communication Networks: From Wired Technologies to Cloud Computing and the Internet of Things (Computer Communications and Networks)

This informative text/reference presents a detailed review of the state of the art in industrial sensor and control networks. The book examines a broad range of applications, along with their design objectives and technical challenges. The coverage includes fieldbus technologies, wireless communication technologies, network...

Monitoring, Security, and Rescue Techniques in Multiagent Systems (Advances in Soft Computing)
Monitoring, Security, and Rescue Techniques in Multiagent Systems (Advances in Soft Computing)
In todays society the issue of security, understood in the widest context, have become a crucial one. The people of the information age, having instant access to the sources of knowledge and information expect the technology to improve their safety in all respects. That, straightforwardly, leads to the demand for methods, technologies, frameworks...
RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations
RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations
The escalating demand for ubiquitous computing along with the complementary and flexible natures of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) have sparked an increase in the integration of these two dynamic technologies. Although a variety of applications can be observed under development and in practical use, there...
Olympus PEN E-PL1 For Dummies (Computer/Tech)
Olympus PEN E-PL1 For Dummies (Computer/Tech)

A friendly guide to the Olympus E-PL1, the latest trend in digital cameras

Hybrids offer the flexibility of interchangeable lenses and a large sensor in a smaller body. The Olympus E-PL1 lightens your load without sacrificing shooting power and this fun and friendly guide helps you better understand your camera's...

Intelligent Sensor Design Using the Microchip dsPIC (Embedded Technology)
Intelligent Sensor Design Using the Microchip dsPIC (Embedded Technology)
In this book, readers will find:

In-depth design techniques, real-world examples, detailed figures and usable code

Application chapters thoroughly exploring temperature, pressure and load, and flow sensors

A FREE CD that provides a toolkit of software models in both C and assembly language

Intelligent
...
Cooperative Control of Distributed Multi-Agent Systems
Cooperative Control of Distributed Multi-Agent Systems

The paradigm of ‘multi-agent’ cooperative control is the challenge frontier for new control system application domains, and as a research area it has experienced a considerable increase in activity in recent years. This volume, the result of a UCLA collaborative project with Caltech, Cornell and MIT, presents cutting edge results in...

Robust Systems Theory and Applications (Adaptive and Learning Systems for Signal Processing, Communications and Control Series)
Robust Systems Theory and Applications (Adaptive and Learning Systems for Signal Processing, Communications and Control Series)
A complete, up-to-date textbook on an increasingly important subject

Robust Systems Theory and Applications covers both the techniques used in linear robust control analysis/synthesis and in robust (control-oriented) identification. The main analysis and design methods are complemented by elaborated examples and a group of worked-out...

OECD Information Technology Outlook 2010
OECD Information Technology Outlook 2010

The OECD Information Technology Outlook 2010 has been prepared by the OECD under the guidance of the OECD Committee for Information, Computer and Communications Policy (ICCP), and in particular the Working Party on the Information Economy. This edition is the tenth in a biennial series designed to provide members with a broad overview of...

Mobile and Web Messaging: Messaging Protocols for Web and Mobile Devices
Mobile and Web Messaging: Messaging Protocols for Web and Mobile Devices

Learn how to use messaging technologies to build responsive and resilient applications for mobile devices and web browsers. With this hands-on guide, you’ll use the Stomp and Mqtt messaging protocols to write iOs and web applications capable of sending and receiving Gps and device sensor data, text messages, and alerts.

...
Security of Mobile Communications
Security of Mobile Communications

The explosive demand for mobile communications is driving the development of wireless technology at an unprecedented pace. Unfortunately, this exceptional growth is also giving rise to a myriad of security issues at all levels — from subscriber to network operator to service provider.

Providing technicians and designers with a...

unlimited object storage image
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy