Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Working GlobeSmart: 12 People Skills for Doing Business Across Borders
Working GlobeSmart: 12 People Skills for Doing Business Across Borders

By any measure, business success is no longer solely about hard work, good intentions, and technical expertise. Relationship building, communication, and the ability to forge cooperation across organizational lines are key--especially when operating across borders, spanning time zones, and crossing cultures.

Whether you are working for...

Mobile Ad Hoc Networking
Mobile Ad Hoc Networking
The wireless arena has been experiencing exponential growth in the past decade. We have
seen great advances in network infrastructures, growing availability of wireless applications,
and the emergence of omnipresent wireless devices such as portable or handheld
computers, PDAs, and cell phones, all getting more powerful in their
...
Protocol Engineering
Protocol Engineering

Communication protocols form the operational basis of computer networks and tele­communication systems. They are behavior conventions that describe how com­munication systems inter­act with each other, defining the temporal order of the interactions and the formats of the data units exchanged – essentially they determine the...

Heat Conduction
Heat Conduction

The long-awaited revision of the bestseller on heat conduction

Heat Conduction, Third Edition is an update of the classic text on heat conduction, replacing some of the coverage of numerical methods with content on micro- and nanoscale heat transfer. With an emphasis on the mathematics and underlying physics, this new...

Real-Time Systems: Formal Specification and Automatic Verification
Real-Time Systems: Formal Specification and Automatic Verification
Real-time systems need to react to certain input stimuli within given time bounds. For example, an airbag in a car has to unfold within 300 milliseconds in a crash. There are many embedded safety-critical applications and each requires real-time specification techniques. This text introduces three of these techniques, based on logic and automata:...
System-level Test and Validation of Hardware/Software Systems (Springer Series in Advanced Microelectronics)
System-level Test and Validation of Hardware/Software Systems (Springer Series in Advanced Microelectronics)
New manufacturing technologies have made possible the integration of entire systems on a single chip. This new design paradigm, termed system-on-chip (SOC), together with its associated manufacturing problems, represents a real challenge for designers.

SOC is also reshaping approaches to test and validation activities. These are beginning to...

Helium Cryogenics (International Cryogenics Monograph Series)
Helium Cryogenics (International Cryogenics Monograph Series)

Twenty five years have elapsed since the original publication of Helium Cryogenics. During this time, a considerable amount of research and development involving helium fluids has been carried out culminating in several large-scale projects. Furthermore, the field has matured through these efforts so that there is now a broad...

Qt 5 Projects: Develop cross-platform applications with modern UIs using the powerful Qt framework
Qt 5 Projects: Develop cross-platform applications with modern UIs using the powerful Qt framework

Design, build, and deploy powerful applications with amazing user interfaces on embedded, mobile, and desktop platforms

Key Features

  • Easily compile, run, and debug your applications from the powerful Qt Creator IDE
  • Future-proof your applications with Qt Test and modern...
The Role of Labour Mobility and Informal Networks for Knowledge Transfer
The Role of Labour Mobility and Informal Networks for Knowledge Transfer
The purpose of this volume is to analyze the microfoundations of knowledge spillovers. The microeconomic analysis of spillovers leads to the insight that the spillover and flow of knowledge is not at all automatic. Instead, this volume suggests that a filter exists between knowledge and its economic application. The focus of this volume is on...
Post Quantum Cryptography
Post Quantum Cryptography
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature...
Microsoft Office 2007 (Microsoft Official Academic Course Series)
Microsoft Office 2007 (Microsoft Official Academic Course Series)

Welcome to the Microsoft Official Academic Course (MOAC) program for the 2007 Microsoft Office system. MOAC represents the collaboration between Microsoft Learning and John Wiley & Sons, Inc. publishing company. Microsoft and Wiley teamed up to produce a series of textbooks that deliver compelling and innovative teaching solutions...

Microprocessor Architecture: From Simple Pipelines to Chip Multiprocessors
Microprocessor Architecture: From Simple Pipelines to Chip Multiprocessors

Computer architecture is at a turning point. Radical changes occurred in the 1980s when the Reduced Instruction Set Computer (RISC) philosophy, spurred in good part by academic research, permeated the industry as a reaction to the Complex Instruction Set Computer (CISC) complexities. Today, three decades later, we have reached a point where...

unlimited object storage image
Result Page: 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy