Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Block Trace Analysis and Storage System Optimization: A Practical Approach with MATLAB/Python Tools
Block Trace Analysis and Storage System Optimization: A Practical Approach with MATLAB/Python Tools
Understand the fundamental factors of data storage system performance and master an essential analytical skill using block trace via applications such as MATLAB and Python tools. You will increase your productivity and learn the best techniques for doing specific tasks (such as analyzing the IO pattern in a quantitative way, identifying...
Cryptography and Network Security: Principles and Practice (5th Edition)
Cryptography and Network Security: Principles and Practice (5th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Handbook of Multisensor Data Fusion
Handbook of Multisensor Data Fusion

Multisensor data fusion is an emerging technology with important applications in both the military and civilian sectors, such as target recognition, robotics, medical diagnostics, and "smart" buildings. It draws on techniques from wide-ranging disciplines, including artificial intelligence, pattern recognition, and statistical...

Designing Embedded Systems with PIC Microcontrollers, Second Edition: Principles and Applications
Designing Embedded Systems with PIC Microcontrollers, Second Edition: Principles and Applications

PIC microcontrollers are used worldwide in commercial and industrial devices. The 8-bit PIC which this book focuses on is a versatile work horse that completes many designs. An engineer working with applications that include a microcontroller will no doubt come across the PIC sooner rather than later. It is a must to have a working knowledge...

Network Security Essentials: Applications and Standards (4th Edition)
Network Security Essentials: Applications and Standards (4th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Microarrays in Clinical Diagnostics (Methods in Molecular Medicine)
Microarrays in Clinical Diagnostics (Methods in Molecular Medicine)
Within the last decade, microarray technology has evolved from an emerging technology developed and used by a few laboratories into a well-established technology used in laboratories all over the world. In fact, the need to characterize genetic alterations is one of the highest priorities for the future of medicine and the...
Geometric Fundamentals of Robotics (Monographs in Computer Science)
Geometric Fundamentals of Robotics (Monographs in Computer Science)
Geometric Fundamentals of Robotics provides an elegant introduction to the geometric concepts that are important to applications in robotics. This second edition is still unique in providing a deep understanding of the subject: rather than focusing on computational results in kinematics and robotics, it includes significant state-of-the...
Electrical Engineering: Principles and Applications (5th Edition)
Electrical Engineering: Principles and Applications (5th Edition)

For undergraduate introductory or survey courses in electrical engineering.

 

ELECTRICAL ENGINEERING: PRINCIPLES AND APPLICATIONS, 5/e helps students learn electrical-engineering fundamentals with minimal frustration. Its goals are to...

Living Green: The Missing Manual
Living Green: The Missing Manual

Taking care of the earth is more important than ever, but the problems we're facing can seem overwhelming. Living Green: The Missing Manual helps make earth-friendly decisions more manageable by narrowing them down to a few simple choices. This all-in-one resource is packed with practical advice on ways you can help the...

Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-to-peer (P2P) has proven as a most successful way to produce large scale, reliable, and cost-effective applications, as illustrated for file sharing or VoIP. P2P storage is an emerging field of application which allows peers to collectively leverage their resources towards ensuring the reliability and availability of user...
Similarity Search: The Metric Space Approach (Advances in Database Systems)
Similarity Search: The Metric Space Approach (Advances in Database Systems)
The area of similarity searching is a very hot topic for both research and commercial applications. Current data processing applications use data with considerably less structure and much less precise queries than traditional database systems. Examples are multimedia data like images or videos that offer queryby-example search, product catalogs...
Self-* and P2P for Network Management: Design Principles and Case Studies (SpringerBriefs in Computer Science)
Self-* and P2P for Network Management: Design Principles and Case Studies (SpringerBriefs in Computer Science)

The network management community has been pushed towards the design of alternative management approaches able to support heterogeneity, scalability, reliability, and minor human intervention. The employment of self-* properties and Peer-To-Peer (P2P) are seen as promising alternatives, able to provide the sophisticated solutions required.

...
Result Page: 52 51 50 49 48 47 46 45 44 43 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy