Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Self-Similar Processes in Telecommunications
Self-Similar Processes in Telecommunications

For the first time the problems of voice services self-similarity are discussed systematically and in detail with specific examples and illustrations.

‘Self-Similar Processes in Telecommunications’ considers the self-similar (fractal and multifractal) models of telecommunication traffic and efficiency...

The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value
The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value

"It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are on the right track." --The authors of The Privacy Engineer's Manifesto

The Privacy Engineer's Manifesto: Getting...

Distributed Systems Architecture: A Middleware Approach
Distributed Systems Architecture: A Middleware Approach
Middleware is the bridge that connects distributed applications across different physical locations, with different hardware platforms, network technologies, operating systems, and programming languages. This book describes middleware from two different perspectives: from the viewpoint of the systems programmer and from the viewpoint of the...
A Primer for Mathematics Competitions
A Primer for Mathematics Competitions
The importance of mathematics competitions has been widely recognized for three reasons: they help to develop imaginative capacity and thinking skills whose value far transcends mathematics; they constitute the most effective way of discovering and nurturing mathematical talent; and they provide a means to combat the prevalent false image of...
Cells and Robots: Modeling and Control of Large-Size Agent Populations (Springer Tracts in Advanced Robotics)
Cells and Robots: Modeling and Control of Large-Size Agent Populations (Springer Tracts in Advanced Robotics)
From the reviews:

"This interesting monograph is devoted to the study of multi-agent, populations of biological cells and robot teams. … The main objective of the approach is to provide solutions to the problem of how dynamics of an individual agent propagates to the population dynamics. … This original monograph has a wide...

The Logic of Scientific Discovery (Routledge Classics)
The Logic of Scientific Discovery (Routledge Classics)
`One of the most important documents of the twentieth century.' - Sir Peter Medawar, New Scientist

`One cannot help feeling that, if it had been translated as soon as it had been originally published, philosophy in this country might have been saved some detours. Professor Popper's thesis has that quality of greatness that, once
...
104 Number Theory Problems: From the Training of the USA IMO Team
104 Number Theory Problems: From the Training of the USA IMO Team
This challenging problem book by renowned US Olympiad coaches, mathematics teachers, and researchers develops a multitude of problem-solving skills needed to excel in mathematical contests and research in number theory. Offering inspiration and intellectual delight, the problems throughout the book encourage students to express their ideas,...
Development of Novel Anti-HIV Pyrimidobenzothiazine Derivatives (Springer Theses)
Development of Novel Anti-HIV Pyrimidobenzothiazine Derivatives (Springer Theses)

The author successfully developed novel anti-HIV PD 404182 derivatives that exhibited submicromolar inhibitory activity against both HIV-1 and HIV-2. His thesis is in three parts. The first part expounds efficient methods for the synthesis of tricyclic heterocycles related to PD 404182 based on the...

Absolute Beginner's Guide to Security, Spam, Spyware & Viruses
Absolute Beginner's Guide to Security, Spam, Spyware & Viruses

Batten down the hatches! Hackers, spammers and thieves (oh my!) are after you! The mere act of turning on an Internet-connected computer can put you, your family, and your personal finances at risk by exposing you to viruses, scam artists, hackers, identity thieves, and spammers. How do you fight back? ...

Effective Knowledge Transfer in Multinational Corporations
Effective Knowledge Transfer in Multinational Corporations
Those who have really enabled this research – and will, I hope, also benefit from its outcome at one point or other – are the managers who participated in the study. I hope my lengthy questionnaire and my numerous follow-up calls have not discouraged them to support further empirical studies. Special thanks go to my advisers, Professors...
LDAP Metadirectory Provisioning Methodology: a step by step method to implementing LDAP based metadirectory provisioning
LDAP Metadirectory Provisioning Methodology: a step by step method to implementing LDAP based metadirectory provisioning

This work provides system architects a methodology for the implementation of x.500 and LDAP based metadirectory provisioning systems. In addition this work assists in the business process analysis that accompanies any deployment. DOC Safe Harbor & European Commission’s Directive on Data Protection (Directive 95/46/EC) issues are also...

IP-Traffic Theory and Performance (Signals and Communication Technology)
IP-Traffic Theory and Performance (Signals and Communication Technology)
This book presents different approaches in IP traffic theory and classifies them, especially towards applications in the Internet. It comprises the state of the art in this area, which is currently presented only by numerous research papers and overview articles.

The book provides an ideal starting point for detailed studies of traffic analysis...

Result Page: 12 11 10 9 8 7 6 5 4 3 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy