Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Signaling And Switching For Packet Telephony (Artech House Telecommunications Library)
Signaling And Switching For Packet Telephony (Artech House Telecommunications Library)
Voice telephony was arguably the first telecommunications service to achieve truly widespread deployment. Data services came into their own much later. To be sure, data telecommunication (in the form of smoke signals and other visual semaphore schemes, for example) has been around for a very long time. Note also that the telegraph preceded the...
Designing Large Scale LANs
Designing Large Scale LANs
Large networks are complex systems, with many interdependent devices held together only by the strength of the network designer's specifications. It takes a lot of knowledge--and a lot of time--to make sure that the capacity of links and nodes is neither wasted nor overloaded. Designing Large-Scale LANs explains how the pieces of a large...
IC Interconnect Analysis
IC Interconnect Analysis
As integrated circuit (IC) feature sizes scaled below a quarter of a micron, thereby defining the deep submicron (DSM) era, there began a gradual shift in the impact on performance due to the metal interconnections among the active circuit components. Once viewed as merely parasitics in terms of their relevance to the overall circuit behavior,...
Doing Internet Research: Critical Issues and Methods for Examining the Net
Doing Internet Research: Critical Issues and Methods for Examining the Net

Whether or not one believes the hyperbolic claims about the Internet being the biggest thing since the invention of the wheel, the Internet is a medium with great consequences for social and economic life. Doing Internet Research is written to help people discern in what ways it has commanded the public imagination, and the...

Multimedia Security : Steganography and Digital Watermarking Techniques for Protection of Intellectual Property
Multimedia Security : Steganography and Digital Watermarking Techniques for Protection of Intellectual Property
Multimedia security has become a major research topic, yielding numerous academic papers in addition to many watermarking-related companies. In this emerging area, there are many challenging research issues that deserve sustained studying towards an effective and practical system. Multimedia Security: Steganography and Digital Watermarking...
Introduction to Embedded Systems: Interfacing to the Freescale 9S12
Introduction to Embedded Systems: Interfacing to the Freescale 9S12

Embedded computer systems are electronic systems that include a microcomputer to perform specific dedicated tasks. The computer is hidden inside these products. Embedded systems are ubiquitous. Every week millions of tiny computer chips come pouring out of factories like Freescale, Microchip, Philips, Texas Instruments, Silicon Labs,...

Geopositioning and Mobility (ISTE)
Geopositioning and Mobility (ISTE)

This book presents a general overview of the applications and use of geopositioning and GNSS for assisting the supervision and management of mobile terrestrial professions, information, traffic regulation, multimodal information, pedestrian mobility and indoor geopositioning, etc. It especially focuses on the field of mobility and terrestrial...

UPC: Distributed Shared-Memory Programming
UPC: Distributed Shared-Memory Programming
A must-have for UPC programmers and applications developers

This publication provides an in-depth interpretation of UPC language specifications for use in highly parallel systems. With its extensive use of examples, UPC programming case studies, and illustrations, it offers new insights into developing efficient and effective UPC applications...

Geospatial Services and Applications for the Internet
Geospatial Services and Applications for the Internet
The use of geospatial technologies has become ubiquitous since the leading Internet vendors delivered a number of popular map websites. Today, businesses are either migrating location-specific capabilities into their information systems, or expanding existing Geospatial Information Systems (GIS) implementation into enterprise-wide solutions....
The Essential Guide to Telecommunications (5th Edition) (Essential Guides (Prentice Hall))
The Essential Guide to Telecommunications (5th Edition) (Essential Guides (Prentice Hall))

A Completely Revised Bestseller with an Updated Industry Overview and New Coverage of Mobile Networks, LTE, Spectrum, Cloud Computing, and More!

 

The #1 Telecom Guide for Businesspeople and Nontechnical Professionals, Fully Updated for Cloud...

Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
This book constitutes the refereed proceedings of the 7th International Workshop on Information Security Applications, WISA 2006, held in Jeju Island, Korea in August 2006.

The 30 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 146 submissions. The papers are organized in topical...

Next Generation Networks: Perspectives and Potentials
Next Generation Networks: Perspectives and Potentials

Next Generation Networks (NGN) provide ubiquitous connectivity with pervasive accessibility to service, application, content and information.  NGN will bring tremendous advantages to companies and individuals, in terms of access to information, education and knowledge, efficiency, dematerialisation and new user experiences.

...

unlimited object storage image
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy