Home | Amazing | Today | Tags | Publishers | Years | Search 
High Performance Embedded Computing Handbook: A Systems Perspective
High Performance Embedded Computing Handbook: A Systems Perspective
Embedded systems technology involves a range of topics, including analog-to-digital conversion and application-specific integrated circuit design. From the history of high-performance computing to a discussion of future directions, High Performance Embedded Computing Handbook offers comprehensive coverage of all aspects of these...
Processor Description Languages, Volume 1 (Systems on Silicon)
Processor Description Languages, Volume 1 (Systems on Silicon)
The only book providing comprehensive coverage of all modern processor description languages; a must-have reference for embedded processor designers!

Efficient design of embedded processors plays a critical role in embedded systems design. Processor description languages and their associated specification, exploration and
...
Computable Models of the Law: Languages, Dialogues, Games, Ontologies (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)
Computable Models of the Law: Languages, Dialogues, Games, Ontologies (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)
Information technology has now pervaded the legal sector, and the very modern concepts of e-law and e-justice show that automation processes are ubiquitous. European policies on transparency and information society, in particular, require the use of technology and its steady improvement.

Some of the revised papers presented in this book...

Network Security Evaluation: Using the NSA IEM
Network Security Evaluation: Using the NSA IEM
Are you an information security professional looking for a way to conduct network evaluations in a comprehensive and customized manner? Did you know that the National Security Agency has a methodology that they use and recommend? Security Evaluation was written by professionals who not only use this methodology themselves, but who helped develop...
Networked RFID: Systems, Software and Services (Computer Communications and Networks)
Networked RFID: Systems, Software and Services (Computer Communications and Networks)
RFID technology has been available for decades, but it is only recently that its application has become a core topic for computing. This book introduces the technologies and techniques of large-scale RFID-enabled mobile computing systems, set in the context of specific case studies.

The book begins with a quick introduction to RFID basics and...

Spatial Databases: With Application to GIS (The Morgan Kaufmann Series in Data Management Systems)
Spatial Databases: With Application to GIS (The Morgan Kaufmann Series in Data Management Systems)

"Spatial Databases covers all of the major themes of the field -- representation, query languages, computational geometry, spatial indexing -- using geographic information systems as the principal application domain and motivation. It is an excellent introduction for computer science professionals interested in exploring GIS, and an...

The Zope Book (Landmark)
The Zope Book (Landmark)
The Zope Book is an authoritative guide to Zope, an open-source Web application server. Zope goes beyond server-side scripting languages like PHP by providing a complete object framework, a built-in Web server, a Web-based management interface, and load-balancing through ZEO (Zope Enterprise Objects). That's a considerable punch, and Zope...
Security of e-Systems and Computer Networks
Security of e-Systems and Computer Networks
E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of...
Internet Technologies Handbook: Optimizing the IP Network
Internet Technologies Handbook: Optimizing the IP Network
The Internet is an amazing communication medium. Its predecessor network, the ARPANET, was developed over three decades ago, yet many of the fundamental algorithms and protocols are still in use today. Granted, we don’t have to run these protocols on a refrigerator-sized computer; our laptop or palmtop PC will do quite well. But think of it -...
Software Engineering Quality Practices (Applied Software Engineering)
Software Engineering Quality Practices (Applied Software Engineering)
Learn how to attract and keep successful software professionals Software Engineering Quality Practices describes how software engineers and the managers that supervise them can develop quality software in an effective, efficient, and professional manner. This volume conveys practical advice quickly and clearly while avoiding the dogma that...
Handbook of Distance Learning for Real-Time and Asynchronous Information Technology Education
Handbook of Distance Learning for Real-Time and Asynchronous Information Technology Education
In information technology, unlike many other fields, the need to support the unique perspective of technologically advanced students and deliver technology-rich content presents unique challenges. Todays IT students need the ability to interact with their instructor in near-real time, interact with their peers and project team members, and access...
Ubuntu Unleashed 2008 Edition: Covering 8.04 and 8.10 (4th Edition)
Ubuntu Unleashed 2008 Edition: Covering 8.04 and 8.10 (4th Edition)
Ubuntu Unleashed 2008 Edition presents comprehensive coverage of the popular Ubuntu Linux distribution. Windows users, Mac users, and Linux enthusiasts have been increasingly turning to Ubuntu for a user-friendly, easy-to-use Linux distribution.

This book provides detailed information on installing, using, and administering Ubuntu....

Result Page: 667 666 665 664 663 662 661 660 659 658 657 656 655 654 653 652 651 650 649 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy