Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ultra Low-Power Electronics and Design (Solid Mechanics and Its Applications)
Ultra Low-Power Electronics and Design (Solid Mechanics and Its Applications)
Power consumption is a key limitation in many high-speed and high-data-rate electronic systems today, ranging from mobile telecom to portable and desktop computing systems, especially when moving to nanometer technologies. Ultra Low-Power Electronics and Design offers to the reader the unique opportunity of accessing in an easy and...
Programming Language Pragmatics, Second Edition
Programming Language Pragmatics, Second Edition
"Michael Scott's book could have been entitled: Why Programming Languages Work. It takes a fresh look at programming languages by bringing together ideas and techniques usually covered in disparate language design, compiler, computer architecture, and operating system courses. Its comprehensive and integrated presentation of language...
Building Embedded Linux Systems
Building Embedded Linux Systems
There's a great deal of excitement surrounding the use of Linux in embedded systems -- for everything from cell phones to car ABS systems and water-filtration plants -- but not a lot of practical information. Building Embedded Linux Systems offers an in-depth, hard-core guide to putting together embedded systems based on Linux.
...
Technology Due Diligence: Best Practices for Chief Information Officers, Venture Capitalists, and Technology Vendors
Technology Due Diligence: Best Practices for Chief Information Officers, Venture Capitalists, and Technology Vendors
Due diligence conducted around technology decisions is complex. Done correctly, it has the power to enable outstanding positive outcomes; done poorly, it can wreak havoc on organizations, corporate cultures, and markets.

Technology Due Diligence: Best Practices for Chief Information Officers, Venture Capitalists, and Technology Vendors...

Advanced Error Control Techniques for Data Storage Systems
Advanced Error Control Techniques for Data Storage Systems
With the massive amount of data produced and stored each year, reliable storage and retrieval of information is more crucial than ever. Robust coding and decoding techniques are critical for correcting errors and maintaining data integrity. Comprising chapters thoughtfully selected from the highly popular Coding and Signal Processing for Magnetic...
Automatic Fingerprint Recognition Systems
Automatic Fingerprint Recognition Systems
Advances in automatic fingerprint recognition are driven by improved fingerprint sensing and advancements in areas such as computer architecture, pattern recognition, image processing, and computer vision. In addition to the new developments in science and technology, several recent social and political events have increased the level of interest...
The Design Analysis Handbook: A Practical Guide to Design Validation
The Design Analysis Handbook: A Practical Guide to Design Validation
If you need to create reliable, cost-effective, optimized designs, The Design Analysis Handbook provides a practical framework for integrating quality into the design process from start to finish. The methodology used is called Worst Case Analysis Plus (WCA+), a design-validation tool that demands thoroughness and analytical thinking by the user....
LDAP Metadirectory Provisioning Methodology: a step by step method to implementing LDAP based metadirectory provisioning
LDAP Metadirectory Provisioning Methodology: a step by step method to implementing LDAP based metadirectory provisioning

This work provides system architects a methodology for the implementation of x.500 and LDAP based metadirectory provisioning systems. In addition this work assists in the business process analysis that accompanies any deployment. DOC Safe Harbor & European Commission’s Directive on Data Protection (Directive 95/46/EC) issues are also...

Next-Generation FTTH Passive Optical Networks: Research towards unlimited bandwidth access
Next-Generation FTTH Passive Optical Networks: Research towards unlimited bandwidth access
Fibre-to-the-Home networks constitute a fundamental telecom segment with the required potential to match the huge capacity of transport networks with the new user communication demands. Huge investments in access network infrastructure are expected for the next decade, with many initiatives already launched around the globe recently, driven by the...
Uncertainty and Intelligent Information Systems
Uncertainty and Intelligent Information Systems
Intelligent systems are necessary to handle modern computer-based technologies managing information and knowledge. This book discusses the theories required to help provide solutions to difficult problems in the construction of intelligent systems. Particular attention is paid to situations in which the available information and data may be...
Oracle Essbase 9 Implementation Guide
Oracle Essbase 9 Implementation Guide

The hot new data analysis trends involve business intelligence and analytics. The technology that supports business intelligence and analytics better than anything else is today's multidimensional OLAP technology - and there is none better than Oracle Essbase! Although storing data in a cube and developing analytical applications leaves...

LPIC-1: Linux Professional Institute Certification Study Guide: (Exams 101 and 102)
LPIC-1: Linux Professional Institute Certification Study Guide: (Exams 101 and 102)
Offering you thorough coverage of the new version of the leading Linux certification from Linux Professional Institute (LPI), this book covers both objectives and materials tested in the two required LPIC-1 exams: LPI 101 and LPI 102. You’ll certainly appreciate the clear, concise information on key exam topics, including using Linux command...
unlimited object storage image
Result Page: 758 757 756 755 754 753 752 751 750 749 748 747 746 745 744 743 742 741 740 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy