Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Video Over IP, Second Edition: IPTV, Internet Video, H.264, P2P, Web TV, and Streaming: A Complete Guide to Understanding the Technology
Video Over IP, Second Edition: IPTV, Internet Video, H.264, P2P, Web TV, and Streaming: A Complete Guide to Understanding the Technology
"I find this book among the better ones, for its systematic approach and clarity of the text...The "Video over IP" book is highly recommended for all practising broadcast engineers."- EBU Techincal Review

?...here is a guide that gives you everything you need to know to find the best solution for your application.? ?
...
Global E-government Readiness Report 2005: From E-government to E-inclusion
Global E-government Readiness Report 2005: From E-government to E-inclusion
In reaffirming the vision of a peaceful, prosperous and just world, leaders at the United Nations World Summit in 2005 outlined a vision of ‘…building a people-centred and inclusive information society, putting the potential of information and communication technologies at the service of development and addressing new challenges of the...
Intelligent Open Learning Systems: Concepts, Models and Algorithms (Intelligent Systems Reference Library)
Intelligent Open Learning Systems: Concepts, Models and Algorithms (Intelligent Systems Reference Library)

The book addresses the problem known in the literature as Open and Distance Learning (ODL). ODL describes new concepts of the process of learning-teaching organization. ODL is becoming very popular at universities that offer education via online and/or distance learning, both in synchronous or asynchronous modes. More precisely, the...

UMTS Network Planning, Optimization, and Inter-Operation with GSM
UMTS Network Planning, Optimization, and Inter-Operation with GSM

The continuing explosive growth in mobile communication is demanding more spectrally efficient radio access technologies than the prevalent second generation (2G) systems such as GSM to handle just the voice traffic. We are already witnessing high levels of mobile penetration exceeding 70% in some countries. It is anticipated that by...

Big Data Application Architecture Q&A: A Problem - Solution Approach (Expert's Voice in Big Data)
Big Data Application Architecture Q&A: A Problem - Solution Approach (Expert's Voice in Big Data)

Big Data Application Architecture Pattern Recipes provides an insight into heterogeneous infrastructures, databases, and visualization and analytics tools used for realizing the architectures of big data solutions. Its problem-solution approach helps in selecting the right architecture to solve the problem at hand. In the process of...

Linux Network Architecture
Linux Network Architecture

This book deals with the architecture of the network subsystem in the Linux kernel. The idea for this book was born at the Institute of Telematics at the University of Karlsruhe, Germany, where the Linux kernel has been used in many research projects and its network functionality is modified or enhanced, respectively, in a...

Design and Performance of 3G Wireless Networks and Wireless LANs
Design and Performance of 3G Wireless Networks and Wireless LANs
Cellular phones, especially those enabled by second-generation
telecommunication systems, have had tremendous impacts on our daily lives.
In some countries such as India, the number of cellular phone subscribers
has far exceeded the number of wired phone subscribers. Meanwhile, the
Internet has also significantly changed our
...
Algorithm Design for Networked Information Technology Systems
Algorithm Design for Networked Information Technology Systems

Networked information technology (NIT) systems are synonymous with network-centric or net-centric systems and constitute the cornerstone of the fast-growing information age. NIT systems' field of application ranges from the traditional worldwide telecommunication systems, banking and financial transactions, on-line travel reservation...

Programming Many-Core Chips
Programming Many-Core Chips

Parallel computing has been confined, for much of its over 40 year history, to highly specialized, technology-wise advanced domains such as scientific computing or telecommunications. There were only a few experts who had the background and experience to write efficient, robust and scalable programs for these parallel machines.

...

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Communication between people has changed with the invention of the telephone. The ability to communicate across continents in real-time has also helped our society in several dimensions including entertainment, trade, finance, and defense. But this new capability did not come without an investment. Building an international telephony...

Stochastic Modeling and Analysis of Telecoms Networks
Stochastic Modeling and Analysis of Telecoms Networks

This book addresses the stochastic modeling of telecommunication networks, introducing the main mathematical tools for that purpose, such as Markov processes, real and spatial point processes and stochastic recursions, and presenting a wide list of results on stability, performances and comparison of systems.
The authors propose a
...

IMS Multimedia Telephony over Cellular Systems: VoIP Evolution in a Converged Telecommunication World
IMS Multimedia Telephony over Cellular Systems: VoIP Evolution in a Converged Telecommunication World
IMS Multimedia Telephony service has been standardized in 3GPP as the replacement of the circuit switched telephony service in cellular networks. The multimedia telephony service consists of several service components such as voice, video and text. ‘IMS Multimedia Telephony over Cellular Systems’ provides a comprehensive overview of the...
unlimited object storage image
Result Page: 16 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy