Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computational Geometry: Algorithms and Applications
Computational Geometry: Algorithms and Applications
This well-accepted introduction to computational geometry is a textbook for high-level undergraduate and low-level graduate courses. The focus is on algorithms and hence the book is well suited for students in computer science and engineering. Motivation is provided from the application areas: all solutions and techniques from computational...
Information Quality (Advances in Management Information Systems)
Information Quality (Advances in Management Information Systems)
Like the lament of Coleridge’s ancient mariner who finds himself adrift at sea surrounded by water yet dying of thirst, many organizations find they are surrounded by data, yet much of it does not truly satisfy their information needs. Today we have at our disposal vast stores of information that come in a variety of forms: records,...
Handbook of Software Quality Assurance
Handbook of Software Quality Assurance
The industry's top guide to software quality -- completely updated!

Practical techniques for mission-critical and commercial software.

Build a great software quality organization.

Prepare for ASQ Software Quality Engineer Certification.

Software quality assurance has never been more challenging -- nor more...

Applied SOA: Service-Oriented Architecture and Design Strategies
Applied SOA: Service-Oriented Architecture and Design Strategies
You need more than theory to make SOA work.

You need this practical guide.

The challenge today's IT professionals face is not how to build a service. It's how to build a quality service, based on solid design principles and integrated into an architecture that enhances overall business...

Electronics System Design Techniques for Safety Critical Applications (Lecture Notes in Electrical Engineering)
Electronics System Design Techniques for Safety Critical Applications (Lecture Notes in Electrical Engineering)
The main purpose of the present manuscript addresses the development of techniques for the evaluation and the hardening of designs implemented on SRAM-based Field Programmable Gate Arrays against the radiation induced effects such as Single Event Upsets (SEUs) or Soft-Errors (SEs). The perspective of the analysis and the design flows proposed in...
Aspects of Explosives Detection
Aspects of Explosives Detection
Detection and quantification of trace chemicals is a major thrust of analytical chemistry. In recent years much effort has been spent developing detection systems for priority pollutants. Less mature are the detections of substances of interest to law enforcement and security personnel:in particular explosives. This volume will discuss the...
Information Security Governance (Wiley Series in Systems Engineering and Management)
Information Security Governance (Wiley Series in Systems Engineering and Management)
This book provides an understanding of governance and its relevance to information security. It gives readers a clear, step-by-step approach to developing a sound security strategy aligned with their business objectives in order to ensure a predictable level of functionality and assurance. Next, it explores various approaches to implementing the...
Technological Turf Wars: A Case Study of the Computer Antivirus Industry
Technological Turf Wars: A Case Study of the Computer Antivirus Industry
Computer security is a technical and social problem. It is just as much about social relationships as it is about computers as tools. Internet security professionals are as concerned with how people use information as they are with how machines manipulate and process that information. This book is a case study of how the knowledge systems...
The Fractal Structure of Data Reference: Applications to the Memory Hierarchy
The Fractal Structure of Data Reference: Applications to the Memory Hierarchy
For purposes of understanding its performance, a computer system is traditionally viewed as a processor coupled to one or more disk storage devices, and driven by externally generated requests (typically called transactions). Over the past several decades, very powerful techniques have become available to the performance analyst attempting to...
Introduction to Airborne Radar, Second Edition (Aerospace & Radar Systems)
Introduction to Airborne Radar, Second Edition (Aerospace & Radar Systems)

The completely rewritten and revised Second Edition updates a famous work originally published by the Hughes Aircraft Company. Much more than a simple introduction, the book is actually a history, reference, tech manual, and textbook rolled into one beautiful illustrated volume, packed with full color photos, drawings, tables and charts, plus...

Mobile Positioning and Tracking: From Conventional to Cooperative Techniques
Mobile Positioning and Tracking: From Conventional to Cooperative Techniques

This book presents the most recent state of the art in mobile positioning and tracking techniques.

This book discusses mobile positioning solutions applied on top of current wireless communication networks. In addition, the authors introduce advanced and novel topics such as localization in heterogeneous and cooperative...

Computer Aided and Integrated Manufacturing Systems, Vol. 1: Computer Techniques
Computer Aided and Integrated Manufacturing Systems, Vol. 1: Computer Techniques

This is an invaluable five-volume reference on the very broad and highly significant subject of computer aided and integrated manufacturing systems. It is a set of distinctly titled and well-harmonized volumes by leading experts on the international scene.

The techniques and technologies used in computer aided and integrated...

unlimited object storage image
Result Page: 821 820 819 818 817 816 815 814 813 812 811 810 809 808 807 806 805 804 803 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy