Home | Amazing | Today | Tags | Publishers | Years | Search 
Wireless Communications Design Handbook, Vol. 2: Terrestrial and Mobile Interference
Wireless Communications Design Handbook, Vol. 2: Terrestrial and Mobile Interference
Most books in wireless communications address technical subjects which are relevant to ground mobile systems. Volume 2: Terrestrial and Mobile Interference of the Wireless Communications Design Handbook addresses a topic frequently overlooked in ground mobile wireless system design: interference problems at the...
Cooperative Control of Distributed Multi-Agent Systems
Cooperative Control of Distributed Multi-Agent Systems

The paradigm of ‘multi-agent’ cooperative control is the challenge frontier for new control system application domains, and as a research area it has experienced a considerable increase in activity in recent years. This volume, the result of a UCLA collaborative project with Caltech, Cornell and MIT, presents cutting edge results in...

Cisco Secure Firewall Services Module (FWSM)
Cisco Secure Firewall Services Module (FWSM)

By definition, a firewall is a single device used to enforce security policies within a network or between networks by controlling traffic flows.

The Firewall Services Module (FWSM) is a very capable device that can be used to enforce those security policies. The FWSM was developed as a module or blade that resides in either
...

Color Constancy (The Wiley-IS&T Series in Imaging Science and Technology)
Color Constancy (The Wiley-IS&T Series in Imaging Science and Technology)
A human observer is able to recognize the color of objects irrespective of the light used to illuminate the objects. This ability is called color constancy. In photography, color constancy is known under the name white balance. Most amateur photographers have probably experienced the following problem at one time or another when a photograph is...
Hybrid Methods in Pattern Recognition
Hybrid Methods in Pattern Recognition
The discipline of pattern recognition has seen enormous progress since its beginnings more than four decades ago. Over the years various approaches have emerged, based on statistical decision theory, structural matching and parsing, neural networks, fuzzy logic, artificial intelligence, evolutionary computing, and others. Obviously, these...
Systems Bioinformatics: An Engineering Case-Based Approach
Systems Bioinformatics: An Engineering Case-Based Approach
The high-throughput nature of bioinformatics and system biology has made traditional biological methods, which tend to focus one or two molecules at a time, obsolete. It has made engineering and problem solving skills essential to attack the resulting complex, multiscale problems. Certain technologies, such as robotics automation, microfabrication,...
Logic Programming and Nonmonotonic Reasoning: 9th International Conference, LPNMR 2007, Tempe, AZ, USA, May 15-17, 2007
Logic Programming and Nonmonotonic Reasoning: 9th International Conference, LPNMR 2007, Tempe, AZ, USA, May 15-17, 2007
This book constitutes the refereed proceedings of the 9th International Conference on Logic Programming and Nonmonotonic Reasoning, LPNMR 2007, held in Tempe, AZ, USA in May 2007.

The 18 revised full papers, 5 revised poster papers, and 7 system descriptions presented together with 2 invited papers were carefully reviewed and selected for...

Windows XP Unleashed
Windows XP Unleashed
Windows XP Unleashed guides the advanced reader through nearly every Windows XP topic imaginable giving ideas and solutions practical to typical problems encountered by professionals. Examples of topics covered are:

* Installations, use, and maintenance;
* Performance tuning;
* Optimizing memory;
* Detailed registry
...

Pro Drupal Development, Second Edition (Beginning from Novice to Professional)
Pro Drupal Development, Second Edition (Beginning from Novice to Professional)
Widely praised for its in–depth coverage of Drupal internals, bestselling Pro Drupal Development has been completely updated for Drupal 6 in this latest edition, and there are even more tricks of the trade to help you further yourself as a professional Drupal developer.

Assuming you already know how to install and bring a...

Auditing and Security: AS/400, NT, UNIX, Networks, and Disaster Recovery Plans
Auditing and Security: AS/400, NT, UNIX, Networks, and Disaster Recovery Plans
A complete and definitive guide to auditing the security of IT systems for managers, CIOs, controllers, and auditors

This up-to-date resource provides all the tools you need to perform practical security audits on the entire spectrum of a company's IT platforms-from the mainframe to the individual PC-as well as the networks that connect
...
Contributions to Ubiquitous Computing (Studies in Computational Intelligence)
Contributions to Ubiquitous Computing (Studies in Computational Intelligence)
Mark Weisers vision of computers moving out of our focus of attention and becoming oblivious devices that occur in large numbers and provide smart computing und communication services to individuals as needed is still far from being reality.

This book puts the larger vision of ubiquitous computing in the context of todays mobile and distributed...

Designing from Both Sides of the Screen: How Designers and Engineers Can Collaborate to Build Cooperative Technology
Designing from Both Sides of the Screen: How Designers and Engineers Can Collaborate to Build Cooperative Technology
Designing from Both Sides of the Screen: How Designers and Engineers Can Collaborate to Build Cooperative Technology is a must-have book for anyone developing user interfaces (UI). The authors define a seemingly simple goal, the Cooperative Principle for Technology: "[T]hose who are designing, building, or managing the development of...
Result Page: 663 662 661 660 659 658 657 656 655 654 653 652 651 650 649 648 647 646 645 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy