Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Instructional Technologies: Cognitive Aspects of Online Programs
Instructional Technologies: Cognitive Aspects of Online Programs
Instructional Technologies: Cognitive Aspects of Online Programs provides insight into creating and utilizing successful online educational technologies and programs. Discussing the generalities of Web-based education and the specific technology applications and organizational support necessary to sustaining these programs, this important book will...
Mac OS X Snow Leopard In Depth
Mac OS X Snow Leopard In Depth
You don’t have to see too many of those ubiquitous “Mac versus PC” ads to get the basic idea: Macs are intuitive, easy to use, and they just work. That’s all true, certainly, but it misses something important about the Mac, and particularly about Mac OS X, the Mac operating system: easy is not the same as simple. Easy means...
Finite Ordered Sets: Concepts, Results and Uses (Encyclopedia of Mathematics and its Applications)
Finite Ordered Sets: Concepts, Results and Uses (Encyclopedia of Mathematics and its Applications)

Ordered sets are ubiquitous in mathematics and have significant applications in computer science, statistics, biology and the social sciences. As the first book to deal exclusively with finite ordered sets, this book will be welcomed by graduate students and researchers in all of these areas. Beginning with definitions of key concepts and...

Handbook of Algorithms for Wireless Networking and Mobile Computing
Handbook of Algorithms for Wireless Networking and Mobile Computing

Handbook of Algorithms for Wireless Networking and Mobile Computing focuses on several aspects of mobile computing, particularly algorithmic methods and distributed computing with mobile communications capability. This volume provides the topics that are crucial for building the foundation for the design and construction of future generations of...

Data Mining in Public and Private Sectors: Organizational and Government Applications (Premier Reference Source)
Data Mining in Public and Private Sectors: Organizational and Government Applications (Premier Reference Source)

Data mining has developed rapidly and has become very popular in the past two decades, but actually has its origin in the early stages of IT, then being mostly limited to one-dimensional searching in databases. The statistical basis of what is now also referred to as data mining has often been laid centuries ago. In corporate...

Implementing Domain-Driven Design
Implementing Domain-Driven Design

“For software developers of all experience levels looking to improve their results, and design and implement domain-driven enterprise applications consistently with the best current state of professional practice, Implementing Domain-Driven Design will impart a treasure trove of knowledge hard won within the DDD and...

Unix Unleashed/Book and CD
Unix Unleashed/Book and CD
Given life by Turing Award winning Bell Labs computer scientist Ken Thompson at Murray Hill, N.J., in August 1969, UNIX spent its early years as a research curiosity. When I met up with Unix in the summer of '82, however, it already possessed the one characteristic that destined it to dominate a major chunk of the world's market for operating...
Queenpins: Notorious Women Gangsters of The Modern Era
Queenpins: Notorious Women Gangsters of The Modern Era

The cut throat world of organized crime has long been dominated by men, and such macho godfathers and kingpins as Al Capone, John Dillinger, Pablo Escobar and John Gotti have become legendary. Yet, dig deep into the annals of crime and one can find smart, ambitious and ruthless women who have cracked the glass ceiling of the underworld and...

Managing Mobile Services: Technologies and Business Practices
Managing Mobile Services: Technologies and Business Practices
New, attractive services for communications systems are versatile and promise to make the next generation of communications a success. Yet, as the systems grow more complex and diverse, so do the challenges of managing them.

Service management derives from technologies used in fixed telephony systems and has evolved towards...

HTML5 Data and Services Cookbook
HTML5 Data and Services Cookbook

Over one hundred website building recipes utilizing all the modern HTML5 features and techniques!

Overview

  • Learn to effectively display lists and tables, draw charts, animate elements and use modern techniques such as templates and data-binding frameworks through simple and short examples.
  • ...
2nd EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing: BDCC 2019 (EAI/Springer Innovations in Communication and Computing)
2nd EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing: BDCC 2019 (EAI/Springer Innovations in Communication and Computing)

This proceeding features papers discussing big data innovation for sustainable cognitive computing. The papers feature details on cognitive computing and its self-learning systems that use data mining, pattern recognition and natural language processing (NLP) to mirror the way the human brain works. This international conference...

Security in Wireless Ad Hoc and Sensor Networks
Security in Wireless Ad Hoc and Sensor Networks
This book provides an in-depth guide to security in wireless ad hoc and sensor networks

Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security. It discusses the security attacks and...

unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy