Home | Amazing | Today | Tags | Publishers | Years | Search 
Intelligent Learning Infrastructure for Knowledge Intensive Organizations: A Semantic Web Perspective
Intelligent Learning Infrastructure for Knowledge Intensive Organizations: A Semantic Web Perspective
In the knowledge society, the traditional facts of business life are volatile and not given. Every organization is challenged in this context, to enrich its sensors, and its internal processes toward the exploitation of tangible and intangible resources.

During the last few years, an important shift in management
...
Ubiquitous Multimedia and Mobile Agents: Models and Implementations
Ubiquitous Multimedia and Mobile Agents: Models and Implementations

Ubiquitous multimedia systems, or mobile multimedia systems, offer the promise of pervasive delivery of multimedia content to mobile users and their handheld devices.

Ubiquitous Multimedia and Mobile Agents: Models and Implementations provides the hybridization of two paradigms, namely, ubiquitous/mobile multimedia and mobile...

User-Centered Agile Methods (Synthesis Lectures on Human-Centered Informatics)
User-Centered Agile Methods (Synthesis Lectures on Human-Centered Informatics)
Agile methods have transformed how developers think about organizing the development of a project. Rather than months (or years) of development, followed by months of field test leading up to a release, agile methods organize development into short iterations with continuous testing and a flexible release date. The agile approach...
High Performance Datacenter Networks: Architectures, Algorithms, & Opportunities (Synthesis Lectures on Computer Architecture)
High Performance Datacenter Networks: Architectures, Algorithms, & Opportunities (Synthesis Lectures on Computer Architecture)

Datacenter networks provide the communication substrate for large parallel computer systems that form the ecosystem for high performance computing (HPC) systems and modern Internet applications. The design of new datacenter networks is motivated by an array of applications ranging from communication intensive climatology, complex material...

Computer Systems, Support, and Technology (Computer Science, Technology and Applications)
Computer Systems, Support, and Technology (Computer Science, Technology and Applications)
This book presents and discusses research in the study of computer science. Topics discussed include fuzzy logic in molecular computing; mobile database computing; learning methods for spam filtering; heterogeneous systems; nested relational database systems; advanced array processing techniques and systems and swarm intelligence....
Depth Map and 3D Imaging Applications: Algorithms and Technologies
Depth Map and 3D Imaging Applications: Algorithms and Technologies
This book has three editors, and all of us are involved in image processing and computer vision research. We have contributed to the 3D imaging research, especially in the field of passive optical 3D shape recovery methods. Over the last decade, significant progress had been made in 3D imaging research. As a result, 3D imaging...
The Complete IS-IS Routing Protocol
The Complete IS-IS Routing Protocol
IS-IS has always been my favourite Interior Gateway Protocol. Its elegant simplicity, its well-structured data formats, its flexibility and easy extensibility are all appealing – IS-IS epitomizes link-state routing. Whether for this reason or others, IS-IS is the IGP of choice in some of the world’s largest networks....
Classification, Clustering, and Data Mining Applications: Proceedings
Classification, Clustering, and Data Mining Applications: Proceedings
This book presents some of the key research undertaken by the members of the International Federation of Classification Societies during the two years since our last symposium. If the past is a guide to the future, these papers contain the seeds of new ideas that will invigorate our field.

The editors are grateful
...
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

Thank you for picking up this book! We believe that if you are reading this page, you are an individual seeking to gain a greater degree of familiarity with cybercrime and espionage, and more likely than not, believe that the realities outweigh the fear, uncertainty, and doubt associated with these two topics. Our desire in writing this...

Java Performance
Java Performance
Today, Java is used at the heart of the world’s largest and most critical computing systems. However, when I joined the Java team in 1997 the platform was young and just gaining popularity. People loved the simplicity of the language, the portability of bytecodes, and the safety of garbage collection (versus traditional...
Frommer's Spain 2009 (Frommer's Complete Guides)
Frommer's Spain 2009 (Frommer's Complete Guides)

America’s #1 bestselling travel series

Written by more than 175 outspoken travelers around the globe, Frommer’s Complete Guides help travelers experience places the way locals do.

  • More annually updated guides than any other series
  • 16-page color section and foldout map in all...
Geeks and Geezers
Geeks and Geezers
We were drawn to thinking and then ultimately writing about geeks and geezers from very different starting points. Coauthoring a book isn’t quite like synchronized swimming. It’s more like gaining perspective and depth through incongruity. Through writing and arguing in what seemed like endless and percussive...
Result Page: 438 437 436 435 434 433 432 431 430 429 428 427 426 425 424 423 422 421 420 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy