Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Enterprise Information Systems: 8th International Conference, ICEIS 2006, Paphos, Cyprus, May 23-27, 2006, Revised
Enterprise Information Systems: 8th International Conference, ICEIS 2006, Paphos, Cyprus, May 23-27, 2006, Revised
This book contains the carefully selected best papers of the 8th International Conference on Enterprise Information Sysetms, ICEIS 2006, held in Paphos, Cyprus, in May 2006.

The 4 invited papers and 27 revised and selected papers presented in this volume cover different aspects related to enterprise computing. They were selected from 63...

Advanced Project Portfolio Management and the PMO: Multiplying ROI at Warp Speed
Advanced Project Portfolio Management and the PMO: Multiplying ROI at Warp Speed

This comprehensive book covers the strategy, tactics, and processes needed for successful project portfolio management. It outlines a road map to unprecedented project management improvement and includes a detailed implementation plan for both strategic planning and a PMO that gives you measurable results in weeks. The author delineates four...

Computational Complexity: A Conceptual Perspective
Computational Complexity: A Conceptual Perspective
This book offers a comprehensive perspective to modern topics in complexity theory, which is a central field of the theoretical foundations of computer science. It addresses the looming question of what can be achieved within a limited amount of time with or without other limited natural computational resources. Can be used as an introduction for...
Real Time UML Workshop for Embedded Systems (Embedded Technology)
Real Time UML Workshop for Embedded Systems (Embedded Technology)
"As you might expect, there are plenty of UML diagrams. Real-time UML specifications are used throughout, consistent with the purpose of the book. Designers with UML expertise who want to understand how to address real-time applications will find this book useful, as will those in the real-time world who need to understand how to bring UML...
Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting
Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting
The book consists of a collection of works on utilising the automatic identification technology provided by Radio Frequency Identification (RFID) to address the problems of global counterfeiting of goods. The book presents current research, directed to securing supply chains against the efforts of counterfeit operators, carried out at the Auto-ID...
Network-Centric Service Oriented Enterprise
Network-Centric Service Oriented Enterprise
The emergence of Enterprise services has triggered a major paradigm shift in distributed computing: from Object-Oriented Architecture (OOA) to Service-Oriented Architecture (SOA). As the need grows to incorporate and exchange information across wire-line and wireless networks, so grows the necessity to establish an infrastructure for...
Business Intelligence: Data Mining and Optimization for Decision Making
Business Intelligence: Data Mining and Optimization for Decision Making

Business intelligence is a broad category of applications and technologies for gathering, providing access to, and analyzing data for the purpose of helping enterprise users make better business decisions. The term implies having a comprehensive knowledge of all factors that affect a business, such as customers, competitors, business partners,...

Layers of the Earth (The Restless Earth)
Layers of the Earth (The Restless Earth)
The Earth is made of layers, each with its own unique characteristics and processes that make it a vital part of the planet. The solid inner core, for example, is the farthest layer from the planet's surface, yet it provides much of the heat needed to fuel dramatic surface phenomena such as volcanoes and earthquakes. Likewise, the outer core...
Ubiquitous Computing Fundamentals
Ubiquitous Computing Fundamentals

a must-read text that provides a historical lens to see how ubicomp has matured into a multidisciplinary endeavor. It will be an essential reference to researchers and those who want to learn more about this evolving field.

-From the Foreword, Professor Gregory D. Abowd, Georgia Institute of Technology

...
Wireless Broadband Handbook
Wireless Broadband Handbook
Translate broadband wireless mumbo-jumbo into clear business terms

No guide tackles and clarifies the chaotic acronym-ridden world of broadband wireless better than Wireless Broadband Handbook. Best-selling telecom author Regis "Bud" Bates has the formula to give you the "instant expertise" you need to compete and...

EMI Protection for Communication Systems
EMI Protection for Communication Systems

In recent years, the protection of communication services operating in the same of adjacent channels has become more and more challenging. Communication systems need to be protected from natural and man-made interference. This practical reference provides a through understanding of how to protect communication systems from intentional and...

Moodle Security
Moodle Security

Moving your classes and resources online with a Learning Management System such as Moodle opens up a whole world of possibilities for teaching your students. However, it also opens up a number of threats as your students, private information, and resources become vulnerable to cyber attacks. Learn how to safeguard Moodle to keep the bad guys...

unlimited object storage image
Result Page: 811 810 809 808 807 806 805 804 803 802 801 800 799 798 797 796 795 794 793 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy