Home | Amazing | Today | Tags | Publishers | Years | Search 
Practical System Reliability
Practical System Reliability

THE RISE OF THE INTERNET, sophisticated computing and communications technologies, and globalization have raised customers’ expectations of powerful “always on” services. A crucial characteristic of these “always on” services is that they are highly available; if the customer cannot get a search result,...

ATM & MPLS Theory & Application: Foundations of Multi-Service Networking
ATM & MPLS Theory & Application: Foundations of Multi-Service Networking

Why did we decide to update this book on ATM once again? Mainly, because the publisher asked us to! Seriously, though, in the fast moving telecommunications industry, a lot has happened since the publication of the last edition in 1998. In case you have been asleep, Internet-based communication is clearly the killer application for...

Natural Language Processing and Information Systems: 16th International Conference on Applications of Natural Language to Information Systems
Natural Language Processing and Information Systems: 16th International Conference on Applications of Natural Language to Information Systems

The 16th International Conference on Applications of Natural Language to Information Systems (NLDB 2011) was held during June 28–30, 2011, at the University of Alicante, Spain. Since the first NLDB conference in 1995, the main goal has been to provide a forum for the discussion and dissemination of research on the integration of...

Fundamentals in Information Theory and Coding
Fundamentals in Information Theory and Coding

This book represents my 30 years continuing education courses for graduate and master degree students at the Electronics and Telecommunications Faculty from the Technical University of Cluj Napoca, Romania and partially my research activity too. The presented topics are useful for engineers, M.Sc. and PhD students who need basics in...

Computer Technology Encyclopedia
Computer Technology Encyclopedia

These days, any attempt to write a full-blown encyclopedia or dictionary of computer terminology would be an exercise in futility. New terms and buzzwords appear every day, and information technology fi elds overlap with so many other fi elds it can be hard to determine if a word is IT, telecommunications, or graphics arts, and so on....

Korea's Online Gaming Empire
Korea's Online Gaming Empire

Too often I hear people say ‘ South Korea ’ and ‘ emerging market ’ in the same sentence, ” said Rich Wickham, the global head of Microsoft ’ s Windows games business. “ When it comes to gaming, Korea is the developed market, and it ’ s the rest of the world that ’ s playing...

Wirelessness: Radical Empiricism in Network Cultures
Wirelessness: Radical Empiricism in Network Cultures

Motion, to take a good example, is originally a turbid sensation, of which the native shape is perhaps best preserved in the phenomenon of vertigo. (James 1996a, 62)

Between 1999 and 2009, a “ turbid ” or disordered sensation of change was felt as wireless connections expanded and eroded the edges of the Internet...

Tried and True Object Development: Industry-Proven Approaches with UML (SIGS: Managing Object Technology)
Tried and True Object Development: Industry-Proven Approaches with UML (SIGS: Managing Object Technology)

Written by four experienced Nokia Telecommunications software developers, this practical book focuses on object-based and component-based software development. The authors concentrate on the most important issues in real-life software development, such as the development process itself, software architecture, the development of user...

Guide to Computer Forensics and Investigations
Guide to Computer Forensics and Investigations

The rapid advance of technology has changed and influenced how we think about gathering digital evidence. Soon after the attacks on the World Trade Center in New York City on September 11, 2001, many young men and women volunteered to serve their country in different ways. For those who did not choose the military, options included...

UMTS Signaling: UMTS Interfaces, Protocols, Message Flows and Procedures Analyzed and Explained
UMTS Signaling: UMTS Interfaces, Protocols, Message Flows and Procedures Analyzed and Explained

UMTS is real. In a continuously growing number of countries we can walk in the stores of mobile network operators or resellers and take UMTS PC cards or even third-generation (3G) phones home and use them instantly. Every day the number of equipments and their feature sets gets broader. The “dream” of multimedia on mobile...

Data Mining Techniques: For Marketing, Sales, and Customer Relationship Management
Data Mining Techniques: For Marketing, Sales, and Customer Relationship Management

Fifteen years ago, Michael and I wrote the first version of this book. A little more than 400 pages, the book fulfilled our goal of surveying the field of data mining by bridging the gap between the technical and the practical, by helping business people understand the data mining techniques and by helping technical people understand the...

CMOS Integrated Switching Power Converters: A Structured Design Approach
CMOS Integrated Switching Power Converters: A Structured Design Approach

The application framework of the presented research work is stablished in the area of the low-power portable stand-alone devices. Considering as a paradigm application the implementation of future portable terminals for telecommunications, two opposed trends coexist that determine the need for an optimized energy management. An...

Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy