Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Handbook of Task Analysis for Human-Computer Interaction
The Handbook of Task Analysis for Human-Computer Interaction
The most widely cited reference on task analysis has been Task-Analysis for Human-
Computer Interaction, edited by Dan Diaper, who must take the main blame for this new
Handbook of Task Analysis for Human-Computer Interaction, as his motive was in part to
stem the trickle of requests from around the world for chapters from the
...
PC Magazine Digital SLR Photography Solutions
PC Magazine Digital SLR Photography Solutions

If you want to use your Digital SLR camera like a pro, let a pro (or two) show you how! Sally Wiener Grotta and Daniel Grotta have been covering the world of digital photography since 1991, and this book is like a private course in DSLR mastery. From understanding the parts of your camera to using the controls effectively to shooting stunning,...

Knowledge-Based Virtual Education: User-Centred Paradigms
Knowledge-Based Virtual Education: User-Centred Paradigms
Virtual learning plays an important role in providing academicians, educators and students alike, with advanced learning experiences. At the forefront of these current technologies are knowledge-based systems that assess the environment in which such learning will occur and are adaptive by nature to the individual needs of the user (Grossman et...
BlackBerry Pearl For Dummies (Computer/Tech)
BlackBerry Pearl For Dummies (Computer/Tech)
Manage your contacts, appointments, e-mail, and media

Find out how to do a string of things with your BlackBerry Pearl!

It's a fact — your BlackBerry Pearl can do almost anything except bake a pie — but you can use it to e-mail a recipe!

This friendly...

Location and Personalisation: Delivering Online and Mobility Services (BT Communications Technology)
Location and Personalisation: Delivering Online and Mobility Services (BT Communications Technology)
The world is charging towards the new network technologies of broadband and 3G and new application technologies face the challenge of where they can be used. This book takes a pragmatic look at two particular application technologies - location and personalisation - and presents an understanding of the technical and business impact of these...
Investment Risk Management (The Wiley Finance Series)
Investment Risk Management (The Wiley Finance Series)
Risk has two sides: underestimating it harms the investor, while overestimating it prevents the implementation of bold business projects. This book explains, from the point of view of the practitioner, the analysis of investment risk - a proper account of adequate risk management strategies - and offers an objective and readable account of the most...
Algorithms on Strings
Algorithms on Strings
'perfect for lectures on 'stringology', for graduate students as a reference on the topic and for appliers in linguistic or molecular biology' Acta Scientiarum Mathematicarum

This text and reference on string processes and pattern matching presents examples related to the automatic processing of natural language, to the
...
Realization Theory and Design of Digital Images (Lecture Notes in Control and Information Sciences)
Realization Theory and Design of Digital Images (Lecture Notes in Control and Information Sciences)
This monograph deals with the description and design of digital images. Regarding digital images as special input/output relations in our previous book with LNCIS series, the description problem of digital images is transformed into the realization problem of digital images. From the data in digital images, mathematical models will be constructed....
Beginning XML with C# 2008: From Novice to Professional (Expert's Voice in .Net)
Beginning XML with C# 2008: From Novice to Professional (Expert's Voice in .Net)
Beginning XML with C# 2008 focuses on XML and how it is used within .NET 3.5. As you’d expect of a modern application framework, .NET 3.5 has extensive support for XML in everything from data access to configuration, from raw parsing to code documentation. This book demystifies all of this. It explains the basics of XML as well as...
Security and Privacy in Mobile Information and Communication Systems
Security and Privacy in Mobile Information and Communication Systems

MobiSec was the second ICST conference on security and privacy for mobile information and communication systems. It was held in front of the beautiful historic backdrop of Catania, the Sicilian town with marvelous views of Mt. Etna. The never fully dormant volcano provided appropriate scenery, metaphorically relating to the security threats...

The Image Processing Handbook, Sixth Edition
The Image Processing Handbook, Sixth Edition

Image processing is used in a wide variety of applications, for two somewhat different purposes:

1. improving the visual appearance of images to a human observer, including their printing and transmission, and

2. preparing images for the measurement of the features and structures which they reveal.

The...

Iminosugars: From Synthesis to Therapeutic Applications
Iminosugars: From Synthesis to Therapeutic Applications
The field of iminosugars is a very exciting area of research. These carbohydrate mimetics were first imagined and synthesized by chemists in the 1960s before being isolated from Nature a few years later. Since the discovery of their biological activity as potent glycosidase inhibitors in the 1970s, iminosugars have been the subject...
unlimited object storage image
Result Page: 461 460 459 458 457 456 455 454 453 452 451 450 449 448 447 446 445 444 443 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy