Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Managing Trust in Cyberspace
Managing Trust in Cyberspace

In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis...

The Wiley Handbook of Learning Technology (Wiley Handbooks in Education)
The Wiley Handbook of Learning Technology (Wiley Handbooks in Education)

The Wiley Handbook of Learning Technology is an authoritative and up-to-date survey of the fast-growing field of learning technology, from its foundational theories and practices to its challenges, trends, and future developments.

  • Offers an examination of learning technology that is equal parts theoretical and...
Solar Power Your Home For Dummies (Home & Garden)
Solar Power Your Home For Dummies (Home & Garden)
Want to take advantage of solar power in your home? Whether you’re looking to save on your energy costs by adding a few solar components or you want to build a solar-powered house from the ground up, Solar Power Your Home For Dummies takes the mystery out of this energy source and shows you how to put it to work for you!

This...

An Inconstant Landscape: The Maya Kingdom of El Zotz, Guatemala
An Inconstant Landscape: The Maya Kingdom of El Zotz, Guatemala
Presenting the results of six years of archaeological survey and excavation in and around the Maya kingdom of El Zotz, An Inconstant Landscape paints a complex picture of a dynamic landscape over the course of almost 2,000 years of occupation. El Zotz was a dynastic seat of the Classic period in Guatemala. Located between...
Computational Geometry and Computer Graphics in C++
Computational Geometry and Computer Graphics in C++

Our principal objective in this book is to describe some basic problems that arise in computer graphics and computational geometry and to present some practical and relatively simple methods for solving them. In these pages we will not attempt a comprehensive survey of these fields. Rather, we will cover a number of core problems and...

Building Robots With Lego Mindstorms : The Ultimate Tool for Mindstorms Maniacs
Building Robots With Lego Mindstorms : The Ultimate Tool for Mindstorms Maniacs

This book is about building robots using Lego bricks and components. In the first section of the book (Part I) we will discuss why you might find an interest in robotics as a hobby, and why Lego is an ideal system to have a fast start and great results. If you're reading this book you probably own a Mindstorms set, so you already have an...

A Unified Approach to Interior Point Algorithms for Linear Complementarity Problems
A Unified Approach to Interior Point Algorithms for Linear Complementarity Problems

The recent remarkable developments of interior point algorithms began in 1984 with Karmarkar's polynomial-time interior point algorithm for linear programs using a log- arithmic potential function and a projective transformation. The progress has been made so rapidly and extensively that it seems difficult to get a comprehensive...

Security-aware Cooperation in Cognitive Radio Networks (SpringerBriefs in Computer Science)
Security-aware Cooperation in Cognitive Radio Networks (SpringerBriefs in Computer Science)

This brief investigates spectrum efficient and energy efficient strategies, known as cognitive radio networks (CRNs), to ensure secure cooperation between licensed and unlicensed users. The authors address issues of spectrum scarcity, spectrum sensing, transmission performance, trust-aware cooperation, and secure communications. Two...

Criminal Poisoning: Investigational Guide for Law Enforcement, Toxicologists, Forensic Scientists, and Attorneys (Forensic Science and Medicine)
Criminal Poisoning: Investigational Guide for Law Enforcement, Toxicologists, Forensic Scientists, and Attorneys (Forensic Science and Medicine)

In this revised and expanded edition, leading forensic scientist John Trestrail offers a pioneering survey of all that is known about the use of poison as a weapon in murder. Topics range from the use of poisons in history and literature to convicting the poisoner in court, and include a review of the different types of poisons, techniques...

Advanced Encryption Standard - AES: 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004
Advanced Encryption Standard - AES: 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004
This book constГ­tutes the thoroughly refereed postproceedings of the 4th International Conference on the Advanced Encryption Standard, AES 2004, held in Bonn, Germany in May 2004. The 10 revised full papers presented together with an introductory survey and 4 invited papers by leading researchers were carefully selected during two rounds of...
The U.S. Congress: A Very Short Introduction (Very Short Introductions)
The U.S. Congress: A Very Short Introduction (Very Short Introductions)

Many scholars believe that the framers of the Constitution intended Congress to be the preeminent branch of government. Indeed, no other legislature in the world approaches its power. Yet most Americans have only a murky idea of how it works.

In The U.S. Congress, Donald A. Ritchie, a congressional historian for more than...

Impact Analysis of Total Productive Maintenance: Critical Success Factors and Benefits
Impact Analysis of Total Productive Maintenance: Critical Success Factors and Benefits

This book present the state of the art in Total Productive Maintainance (TPM) and its benefits. The authors present a survey applied to 368 manufacturing industries in order to determine their level of execution of TPM. Then a series of causal models are presented. For each model, the authors present a measure of the dependency...

unlimited object storage image
Result Page: 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy